2010
DOI: 10.1109/tii.2010.2068303
|View full text |Cite
|
Sign up to set email alerts
|

A Flexible Design Flow for Software IP Binding in FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…Therefore, many scholars are studying the applications of FPGA. The application of FPGA technology to industrial control systems [63,64] is one of the hot topics. FPGA is usually used to control the PWM wave in electric drive and power electronics systems [65], so as to build a SoC (system on a chip) [66] and designed fuzzy logic controller [67].…”
Section: Fpga Technology and Its Potential In Scnmentioning
confidence: 99%
“…Therefore, many scholars are studying the applications of FPGA. The application of FPGA technology to industrial control systems [63,64] is one of the hot topics. FPGA is usually used to control the PWM wave in electric drive and power electronics systems [65], so as to build a SoC (system on a chip) [66] and designed fuzzy logic controller [67].…”
Section: Fpga Technology and Its Potential In Scnmentioning
confidence: 99%
“…One of the three key registers is pre-loaded with the CV's secret key K C V , which is to be used for deriving the secret IP key K IP for IP decryption; the other two registers are empty initially. The secret key K C V is hidden and obfuscated in the routing information of the CIM's bitstream, which is generally believed to be the hardest to reverse accurately [36].…”
Section: B Core Installation Module (Cim)mentioning
confidence: 99%
“…To make the extraction task harder for the MA, K C V j is proposed to be hidden in the routing information of CIM's bitstream as in [36]. Alternatively, white-box block ciphers [37], [38], which can protect the embedded secret key through strong obfuscation, can be used as the decryption engine of CIM to raise the barrier of successfully extracting the key.…”
Section: B Possible Security Enhancementsmentioning
confidence: 99%
“…This also entails integrating FPGA-related development tasks in the product development flow so as to limit toolchain complexity and reduce engineering costs over the whole product lifetime [10], [11]. One particular research topic has been the use of reconfigurable fabrics (e.g., FPGAs) to accelerate execution of general purpose applications in embedded scenarios [12], [13].…”
Section: Related Workmentioning
confidence: 99%