scispace - formally typeset
Book ChapterDOI

FPGA-Based IP and SoC Security

TLDR
This chapter elaborates the various security techniques adopted in FPGAs, security measures remain as research proposal, along with several alarming security threats open for research.
Abstract
Intellectual property (IP) cores in FPGAs are being used widely as these provide high flexibility and efficiency at low cost and low time-to-market. An IP in FPGA is primarily a HDL design or a bitfile for the same. Security aspects have specific issues for the FPGA IP cores. Partial recon gurability of an FPGA has introduced further security holes. A bitfile or a partial bitstream is loaded on an FPGA architecture in encrypted form in order to prevent unauthorized access of the IP. This encryption of the bitfile may be cracked through side-channel attacks. For authentication of a genuine IP vendor and an authorized IP user, their binary signatures may be included in the FPGA bitstream. However, maintaining resilience of the signatures against tampering is a challenge in case of their public verification. Another recent challenge in FPGAs due to hardware Trojans or extraneous circuitry inserted surreptitiously is being combated with parity-based detection techniques. However, it is still hard for the standard FPGA tools to detect Trojan circuits inserted directly in the bitfile cores. In case of a system-on-a-chip (SoC) implemented with FPGAs, the security issues in IP distribution, IP management, and inter-communication are even more complex and challenging. This chapter elaborates the various security techniques adopted in FPGAs, security measures remain as research proposal, along with several alarming security threats open for research.

read more

Citations
More filters
Proceedings ArticleDOI

Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study

TL;DR: A comparative study of the complexity for cyber security architecture and its application in IoT healthcare industry has been carried out for protecting healthcare industry from cyber attacks focusing on IoT based healthcare devices.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Techniques for Design and Implementation of Secure Reconfigurable PUFs

TL;DR: It is demonstrated how reconfigurability can be exploited to eliminate the stated PUF limitations and how FPGA-based PUFs can be used for privacy protection.
Book ChapterDOI

AES on FPGA from the fastest to the smallest

TL;DR: Two new FPGA designs for the Advanced Encryption Standard (AES) are presented, believed to be the fastest and the smallest, and includes support for continued throughput during key changes for both encryption and decryption which previous pipelined designs have omitted.
Journal Article

AES on FPGA from the fastest to the smallest

TL;DR: In this paper, two new FPGA designs for the Advanced Encryption Standard (AES) are presented, the first achieving 25 Gbps throughput using a Xilinx Spartan-Ill (XC3S2000) device and the second achieving 22 Mbps.
Book ChapterDOI

Ultra High Performance ECC over NIST Primes on Commercial FPGAs

TL;DR: A novel architecture and algorithms for performing ECC arithmetic are described and it is shown that ECC on Xilinx's Virtex-4 SX55 FPGA can be performed at a rate of more than 37,000 point multiplications per second.
Related Papers (5)