SECURE FPGA TECHNOLOGIES AND TECHNIQUES

被引:5
作者
Braeken, An [1 ,2 ]
Kubera, Serge [1 ]
Trouillez, Frederik [1 ,2 ]
Touhafi, Abdellah [1 ,2 ]
Mentens, Nele [3 ,4 ]
Vliegen, Jo [3 ,4 ]
机构
[1] Erasmushogesch Brussel, Dept IWT, Nijverheidskaai 170, B-1070 Anderlecht, Belgium
[2] Vrije Univ Brussel, B-1050 Brussels, Belgium
[3] Katholieke Univ Leuven, ESAD, SCD CISUC, Leuven, Belgium
[4] Katholieke Hogesch Limburg, IWT ACRO, Dipenbeek, Belgium
来源
FPL: 2009 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS | 2009年
关键词
D O I
10.1109/FPL.2009.5272414
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This survey paper proposes an overview of contemporary FPGA-related technologies and techniques that can be used for data and system security. As such we will give an overview of the currently available features in commonly used FPGAs and link these features to established security techniques. The main goal is to evaluate the pros and contras of the different techniques and technologies in order to give directions on the security strategy.
引用
收藏
页码:560 / +
页数:2
相关论文
共 11 条
[1]  
BAETONIU C, 2005, XAPP780V10 XIL
[2]   Side-channel issues for designing secure hardware implementations [J].
Batina, L ;
Mentens, N ;
Verbauwhede, I .
11TH IEEE INTERNATIONAL ON-LINE TESTING SYMPOSIUM, 2005, :118-121
[3]  
CAMPBELL AN, 1995, P INT S TEST FAIL AN
[4]  
Devadas S., 2007, MIT SECURITY LECT PU
[5]  
Drimer, 2008, VOLATILE FPGA DESIGN, P292
[6]  
GUAJARDO J, 2008, LIFE CYCLE FPGA INTR
[7]   Securing embedded systems [J].
Hwang, DD ;
Tiri, SK ;
Verbauwhede, I .
IEEE SECURITY & PRIVACY, 2006, 4 (02) :40-49
[8]  
*NIST, 2001, NIPS PUB 197 SPEC AE
[9]  
Skorobogatov S.P, 2005, Semi-invasive Attacks-A New Approach to Hardware Security Analysis
[10]  
SMERDON M, 2008, WP226V11 XIL