Work Package 1

Software and system-level safety and security solutions against hardware vulnerabilities

WP1 will deal with the software and system-level security and safety solutions against hardware vulnerabilities. All the partners are involved in this work package. The goal of WP1 is to introduce new attacks based on hardware vulnerabilities. It will allow cybersecurity programs or embedded system programs (classically only dealing with software security issues) to introduce main hardware security and safety system-level concepts. These concepts will allow tomorrow’s engineers to build robust systems integrating some system-level countermeasures against hardware attacks.

WP1 is divided into three sub-work packages ( WP1.1, WP1.2, WP1.3 ):

  • WP1.1 targets embedded system security giving emphasis to the amelioration of the existing hardware security courses focused on the implementation of hardware security primitives, hardware countermeasures, and hardware threats (Side-Channel-Attacks, Fault Injection, and JTAG security).
    • WP1.1.1: Practical Lab on Security Evaluation against Fault injection (lab)
    • WP1.1.5: Functional verification of an arbiter – robustness and security evaluation (zip)
  • WP1.2 aims at improving the existing software security courses for software developers focused on software attacks.
    • WP1.2.1: Rowhammer (zip), Cache-timing attack (zip), Spectre (zip), DMA-attacks (zip)
    • WP1.2.2: Hardware security for cybersecurity engineers (zip)
  • WP1.3 targets embedded system reliability and the relations between security and safety
    • WP1.3.2: System reliability and security (lab)

The present sub-page will be updated soon with the following obtained results of WP1.