Managing Security in FPGA-Based Embedded Systems

@article{Huffmire2008ManagingSI,
  title={Managing Security in FPGA-Based Embedded Systems},
  author={Ted Huffmire and B. Brotherton and T. Sherwood and R. Kastner and T. Levin and T. Nguyen and C. Irvine},
  journal={IEEE Design & Test of Computers},
  year={2008},
  volume={25}
}
FPGAs combine the programmability of processors with the performance of custom hardware. As they become more common in critical embedded systems, new techniques are necessary to manage security in FPGA designs. This article discusses FPGA security problems and current research on reconfigurable devices and security, and presents security primitives and a component architecture for building highly secure systems on FPGAs. 
48 Citations
A hardware security scheme for RRAM-based FPGA
  • Yi-Chung Chen, Wei Zhang, H. Li
  • Computer Science
  • 2013 23rd International Conference on Field programmable Logic and Applications
  • 2013
  • 3
A novel PUF-based encryption protocol for embedded System on Chip
  • 1
  • Highly Influenced
  • PDF
A survey on security and trust of FPGA-based systems
  • Jiliang Zhang, G. Qu
  • Computer Science
  • 2014 International Conference on Field-Programmable Technology (FPT)
  • 2014
  • 22
  • PDF
A security embedded system base on TCM and FPGA
  • Huaqiang Huang, C. Hu, J. He
  • Computer Science
  • 2009 2nd IEEE International Conference on Computer Science and Information Technology
  • 2009
  • 6
FPGA-Based Remote-Code Integrity Verification of Programs in Distributed Embedded Systems
  • C. Basile, S. Carlo, A. Scionti
  • Computer Science
  • IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
  • 2012
  • 18
  • PDF
Recent Attacks and Defenses on FPGA-based Systems
  • 11
Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems
  • 7
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 23 REFERENCES
Designing secure systems on reconfigurable hardware
  • 30
  • PDF
FPGA-BASED SINGLE CHIP CRYPTOGRAPHIC SOLUTION ( U )
  • 32
  • PDF
Trusted Design in FPGAs
  • S. Trimberger
  • Computer Science, Engineering
  • 2007 44th ACM/IEEE Design Automation Conference
  • 2007
  • 107
  • Highly Influential
  • PDF
Policy-Driven Memory Protection for Reconfigurable Hardware
  • 38
  • PDF
Reconfigurable computing: a survey of systems and software
  • 1,421
  • PDF
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems
  • 111
  • PDF
A cautionary note regarding the data integrity capacity of certain secure systems
  • 19
  • PDF
A quick safari through the reconfiguration jungle
  • 105
  • PDF
Computer Security Technology Planning Study
  • 857
  • PDF
Subversion as a Threat in Information Warfare
  • 37
  • PDF
...
1
2
3
...