Protecting reprogrammable hardware with polymorphic circuit variation (original) (raw)

Profile image of Jeffrey McDonaldJeffrey McDonald

visibility

description

15 pages

link

1 file

Sign up for access to the world's latest research.

checkGet notified about relevant papers

checkSave papers to use in your research

checkJoin the discussion with peers

checkTrack your impact

A Security Architecture for Reconfigurable Networked Embedded Systems

GIANLUCA DINI

International Journal of Wireless Information Networks, 2010

View PDFchevron_right

Helper-less physically unclonable functions and chip authentication

Roberto Rinaldo

2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014

View PDFchevron_right

Security engineering for embedded systems

Antonio Maña

Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, 2010

View PDFchevron_right

Deterministic circuit variation for anti-tamper applications

Jeffrey McDonald

Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '11, 2011

View PDFchevron_right

Secure architecture for embedded systems

Michael Geis

2015 IEEE High Performance Extreme Computing Conference (HPEC), 2015

View PDFchevron_right

Criticality based reliability against hardware Trojan attacks for processing of tasks on reconfigurable hardware

Amlan Chakrabarti

Microprocessors and Microsystems, 2019

View PDFchevron_right

Secure embedded system hardware design – A flexible security and trust enhanced approach

Apostolos Fournaris

Computers & Electrical Engineering, 2014

View PDFchevron_right

Homomorphic Data Isolation for Hardware Trojan Protection

ِAmr Alanwar

2015 IEEE Computer Society Annual Symposium on VLSI, 2015

View PDFchevron_right

Security of Programmable Logic Controllers and Related Systems: Today and Tomorrow

Wael Alsabbagh

IEEE open journal of the Industrial Electronics Society, 2022

View PDFchevron_right

$\mu$RAI: Securing Embedded Systems with Return Address Integrity

Saurabh Bagchi

Proceedings 2020 Network and Distributed System Security Symposium, 2020

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Using Digital Sensors to Leverage Chips' Security

Naghmeh Karimi

2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), 2020

View PDFchevron_right

A Flexible Crypto-system Based upon the REDEFINE Polymorphic ASIC Architecture

Saptarsi Das

Defence Science Journal, 2012

View PDFchevron_right

Attack Injection into Avionic Systems through Application Code Mutation

Mohamed Kaaniche

2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 2019

View PDFchevron_right

Reconfiguration of Embedded Systems

Dirk Missal

International Conference on Informatics in Control, Automation and Robotics, 2008

View PDFchevron_right

Dynamic Polymorphic Reconfiguration for Anti-Tamper Circuits

Jeffrey McDonald

FPL, 2009

View PDFchevron_right

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Michael Hsiao

Proceedings of the IEEE, 2014

View PDFchevron_right

Early results from ERA — Embedded Reconfigurable Architectures

Roberto Giorgi

2011 9th IEEE International Conference on Industrial Informatics, 2011

View PDFchevron_right

Hardware virtualization based security solution for embedded systems

Sándor Lukács

2014 IEEE International Conference on Automation, Quality and Testing, Robotics, 2014

View PDFchevron_right

Hardware Trojan prevention using layout-level design approach

Sophie Dupuis

2015 European Conference on Circuit Theory and Design (ECCTD), 2015

View PDFchevron_right

X4CP32: A coarse grain general purpose reconfigurable microprocessor

Ivan Silva

2003

View PDFchevron_right

Towards a verification approach for reconfigurable embedded systems

MOHAMED JMAIEL

2012 IEEE Symposium on Computers and Communications (ISCC), 2012

View PDFchevron_right

Reverse Engineering of VLSI Chips: A Road map

Khaled Elleithy

2007

View PDFchevron_right

Reconfigurable Security Primitive for Embedded Systems

Wayne Burleson

2005 International Symposium on System-on-Chip, 2005

View PDFchevron_right

Implementation of a Generic Modular Cryptosystem for the RSA on Reconfigurable Hardware

Deepak Krishnankutty

2009

View PDFchevron_right

Secure FPGA Technologies and Techniques

Abdellah Touhafi

… , 2009. FPL 2009. …, 2009

View PDFchevron_right

Behind the last line of defense: Surviving SoC faults and intrusions

Marcus Völp

Computers & Security

View PDFchevron_right

On the limitations of logic testing for detecting Hardware Trojans Horses

Sophie Dupuis

2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2015

View PDFchevron_right

Implementation of Complex Strategies of Secure Embedded Systems

Franck Wajsburt

2011

View PDFchevron_right

Security primitives for reconfigurable hardware-based systems

Gang Wang

2010

View PDFchevron_right

Circuit ProtectionObfuscation