B. Badrignans, J. Danger, V. Fischer, G. Gogniat, and L. Torres, Security trends for fpgas, From Secured to Secure Reconfigurable Systems, p.252, 2011.
DOI : 10.1007/978-94-007-1338-3

URL : https://hal.archives-ouvertes.fr/lirmm-00616973

P. Cotret, J. Crenne, G. Gogniat, J. Diguet, L. Gaspar et al., Distributed Security for Communications and Memories in a Multiprocessor Architecture, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum
DOI : 10.1109/IPDPS.2011.158

URL : https://hal.archives-ouvertes.fr/ujm-00664284

S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, Security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.3, issue.3, pp.461-491, 2004.
DOI : 10.1145/1015047.1015049

J. Diguet, S. Evain, R. Vaslin, G. Gogniat, and E. Juin, Noccentric security of reconfigurable soc, Proc. ACM/IEEE 1st Int. Symposium on Network-on-Chips, pp.223-232, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00165452

L. Fiorin, G. Palermo, and C. Silvano, A monitoring system for NoCs, Proceedings of the Third International Workshop on Network on Chip Architectures, NoCArc '10, pp.25-30, 2010.
DOI : 10.1145/1921249.1921257

J. Coburn, S. Ravi, A. Raghunathan, and S. Chakradhar, SECA, Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems , CASES '05
DOI : 10.1145/1086297.1086308

. Int, Conference on Compilers, Architectures and Synthesis for Embedded Systems, pp.78-89, 2005.

T. Huffmire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner et al., Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.281-295, 2007.
DOI : 10.1109/SP.2007.28

X. Yan-ling, P. Wei, and X. Zhang, Design and Implementation of Secure Embedded Systems Based on Trustzone, 2008 International Conference on Embedded Software and Systems, pp.136-141, 2008.
DOI : 10.1109/ICESS.2008.59

R. Vaslin, G. Gogniat, J. Diguet, R. Tessier, D. Unnikrishnan et al., Memory security management for reconfigurable embedded systems, 2008 International Conference on Field-Programmable Technology, pp.153-160, 2011.
DOI : 10.1109/FPT.2008.4762378

URL : https://hal.archives-ouvertes.fr/hal-00369049

J. Crenne, R. Vaslin, G. Gogniat, J. Diguet, R. Tessier et al., Configurable memory security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.12, issue.3, 2011.
DOI : 10.1145/2442116.2442121

URL : https://hal.archives-ouvertes.fr/hal-00765636

D. A. Mcgrew and J. Viega, The Security and Performance of the Galois/Counter Mode (GCM) of Operation, INDOCRYPT, pp.343-355, 2004.
DOI : 10.1007/978-3-540-30556-9_27

N. Chang, Y. Liao, and T. Chang, Analysis of shared-link AXI, IET Computers & Digital Techniques, vol.3, issue.4, p.373, 2009.
DOI : 10.1049/iet-cdt.2008.0097