Protecting reprogrammable hardware with polymorphic circuit variation (original) (raw)
visibility
…
description
15 pages
link
1 file
Sign up for access to the world's latest research.
checkGet notified about relevant papers
checkSave papers to use in your research
checkJoin the discussion with peers
checkTrack your impact
Related papers
A Security Architecture for Reconfigurable Networked Embedded Systems
International Journal of Wireless Information Networks, 2010
Helper-less physically unclonable functions and chip authentication
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014
Security engineering for embedded systems
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, 2010
Deterministic circuit variation for anti-tamper applications
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '11, 2011
Secure architecture for embedded systems
2015 IEEE High Performance Extreme Computing Conference (HPEC), 2015
Microprocessors and Microsystems, 2019
Secure embedded system hardware design – A flexible security and trust enhanced approach
Computers & Electrical Engineering, 2014
Homomorphic Data Isolation for Hardware Trojan Protection
2015 IEEE Computer Society Annual Symposium on VLSI, 2015
Security of Programmable Logic Controllers and Related Systems: Today and Tomorrow
IEEE open journal of the Industrial Electronics Society, 2022
$\mu$RAI: Securing Embedded Systems with Return Address Integrity
Proceedings 2020 Network and Distributed System Security Symposium, 2020
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Related papers
Using Digital Sensors to Leverage Chips' Security
2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), 2020
A Flexible Crypto-system Based upon the REDEFINE Polymorphic ASIC Architecture
Defence Science Journal, 2012
Attack Injection into Avionic Systems through Application Code Mutation
2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), 2019
Reconfiguration of Embedded Systems
International Conference on Informatics in Control, Automation and Robotics, 2008
Dynamic Polymorphic Reconfiguration for Anti-Tamper Circuits
FPL, 2009
Hardware Trojan Attacks: Threat Analysis and Countermeasures
Proceedings of the IEEE, 2014
Early results from ERA — Embedded Reconfigurable Architectures
2011 9th IEEE International Conference on Industrial Informatics, 2011
Hardware virtualization based security solution for embedded systems
2014 IEEE International Conference on Automation, Quality and Testing, Robotics, 2014
Hardware Trojan prevention using layout-level design approach
2015 European Conference on Circuit Theory and Design (ECCTD), 2015
X4CP32: A coarse grain general purpose reconfigurable microprocessor
2003
Towards a verification approach for reconfigurable embedded systems
2012 IEEE Symposium on Computers and Communications (ISCC), 2012
Reverse Engineering of VLSI Chips: A Road map
2007
Reconfigurable Security Primitive for Embedded Systems
2005 International Symposium on System-on-Chip, 2005
Implementation of a Generic Modular Cryptosystem for the RSA on Reconfigurable Hardware
2009
Secure FPGA Technologies and Techniques
… , 2009. FPL 2009. …, 2009
Behind the last line of defense: Surviving SoC faults and intrusions
Computers & Security
On the limitations of logic testing for detecting Hardware Trojans Horses
2015 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2015
Implementation of Complex Strategies of Secure Embedded Systems
2011
Security primitives for reconfigurable hardware-based systems
2010