| t0 + 18 |
L1.1 |
Vulnerability assessment at design time |
Report |
| t0 + 42 |
L1.2 |
Deep learning models for automated assessment |
Report |
| t0 + 42 |
L1.3 |
Deep learning models for automated assessment |
Source code |
| t0 + 18 |
L2.1 |
Runtime security |
Report |
| t0 + 24 |
L2.2 |
Multi-domain enclaves and secure monitor |
Report |
| t0 + 40 |
L2.3 |
SCA-resistant TEE |
Source code |
| t0 + 24 |
L3.1 |
AI detection core |
Technical report |
| t0 + 40 |
L3.2 |
Protected SoC prototype |
Short report |
| t0 + 40 |
L3.3 |
Protected SoC prototype |
Hardware description of the platform |