Scalable security path methodology: A cost-security trade-off to protect FPGA IPs against active and passive tampers
Citations
2 citations
References
335 citations
"Scalable security path methodology:..." refers methods in this paper
...We implemented the proposed methodology in VTR toolbox [20]....
[...]
329 citations
265 citations
"Scalable security path methodology:..." refers background in this paper
...In [10-16] it has been shown that encryption keys in Xilinx, Altera, and Microsemi FPGAs are vulnerable to differential power analysis (DPA) attacks and the plaintext bitstream can be extracted when the key is exposed....
[...]
185 citations
"Scalable security path methodology:..." refers background in this paper
...In [10-16] it has been shown that encryption keys in Xilinx, Altera, and Microsemi FPGAs are vulnerable to differential power analysis (DPA) attacks and the plaintext bitstream can be extracted when the key is exposed....
[...]
182 citations
"Scalable security path methodology:..." refers background in this paper
...FPGAs with built-in encryption are expensive and powerhungry for many of embedded applications [4] and [17]....
[...]
...However, recently some papers such as [4] proposed an easy process to decompile the bitstream of modem FPGA families to a textual netlist description in a short time....
[...]