Book ChapterDOI
FPGA-Based IP and SoC Security
Debasri Saha,Susmita Sur-Kolay +1 more
- pp 167-197
TLDR
This chapter elaborates the various security techniques adopted in FPGAs, security measures remain as research proposal, along with several alarming security threats open for research.Abstract:
Intellectual property (IP) cores in FPGAs are being used widely as these provide high flexibility and efficiency at low cost and low time-to-market. An IP in FPGA is primarily a HDL design or a bitfile for the same. Security aspects have specific issues for the FPGA IP cores. Partial recon gurability of an FPGA has introduced further security holes. A bitfile or a partial bitstream is loaded on an FPGA architecture in encrypted form in order to prevent unauthorized access of the IP. This encryption of the bitfile may be cracked through side-channel attacks. For authentication of a genuine IP vendor and an authorized IP user, their binary signatures may be included in the FPGA bitstream. However, maintaining resilience of the signatures against tampering is a challenge in case of their public verification. Another recent challenge in FPGAs due to hardware Trojans or extraneous circuitry inserted surreptitiously is being combated with parity-based detection techniques. However, it is still hard for the standard FPGA tools to detect Trojan circuits inserted directly in the bitfile cores. In case of a system-on-a-chip (SoC) implemented with FPGAs, the security issues in IP distribution, IP management, and inter-communication are even more complex and challenging. This chapter elaborates the various security techniques adopted in FPGAs, security measures remain as research proposal, along with several alarming security threats open for research.read more
Citations
More filters
Proceedings ArticleDOI
Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
Aysha Alharam,Wael El-madany +1 more
TL;DR: A comparative study of the complexity for cyber security architecture and its application in IoT healthcare industry has been carried out for protecting healthcare industry from cyber attacks focusing on IoT based healthcare devices.
References
More filters
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Techniques for Design and Implementation of Secure Reconfigurable PUFs
TL;DR: It is demonstrated how reconfigurability can be exploited to eliminate the stated PUF limitations and how FPGA-based PUFs can be used for privacy protection.
Book ChapterDOI
AES on FPGA from the fastest to the smallest
Tim Good,Mohammed Benaissa +1 more
TL;DR: Two new FPGA designs for the Advanced Encryption Standard (AES) are presented, believed to be the fastest and the smallest, and includes support for continued throughput during key changes for both encryption and decryption which previous pipelined designs have omitted.
Journal Article
AES on FPGA from the fastest to the smallest
Tim Good,Mohammed Benaissa +1 more
TL;DR: In this paper, two new FPGA designs for the Advanced Encryption Standard (AES) are presented, the first achieving 25 Gbps throughput using a Xilinx Spartan-Ill (XC3S2000) device and the second achieving 22 Mbps.
Book ChapterDOI
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
Tim Güneysu,Christof Paar +1 more
TL;DR: A novel architecture and algorithms for performing ECC arithmetic are described and it is shown that ECC on Xilinx's Virtex-4 SX55 FPGA can be performed at a rate of more than 37,000 point multiplications per second.