2008
DOI: 10.1145/1367045.1367053
|View full text |Cite
|
Sign up to set email alerts
|

Designing secure systems on reconfigurable hardware

Abstract: The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deployment of custom hardware. Embedded systems based on reconfigurable hardware integrate many functions onto a single device. Since embedded designers often have no choice but to use soft IP cores obtained from third parties, the cores operate at different trust levels, resulting in mixed-trust designs. The goal of this project is to evaluate recently proposed security primitives for reconfigurable hardware by buildi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 36 publications
0
13
0
Order By: Relevance
“…Next was the networked cryptographic authentication system [Huffmire et al 2008]. As previously discussed, this design contains two μBlaze processors connected to a shared onboard peripheral bus with an integrated reference monitor to regulate access to the shared memory and peripherals.…”
Section: Quantitative Analysis Of the Inspection Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Next was the networked cryptographic authentication system [Huffmire et al 2008]. As previously discussed, this design contains two μBlaze processors connected to a shared onboard peripheral bus with an integrated reference monitor to regulate access to the shared memory and peripherals.…”
Section: Quantitative Analysis Of the Inspection Methodsmentioning
confidence: 99%
“…We have been motivating our discussion so far with the example of a networked cryptographic authentication system to send/receive encrypted data from the Internet using local authentication [Huffmire et al 2008]. In general, cryptographic systems contain sensitive data (both the encrypted data and the cryptographic keys) that must be protected.…”
Section: Motivating Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…Although ideally these cores would be verified by a trusted party, cost and source code requirements can make such a development model impractical. Reliance on off-the-shelf IP modules provided by multiple vendors with different levels of trust introduces serious security concerns [10]. A moat and drawbridge model provides spatial module isolation and statically verifiable communication flow [11], but does not address modules with self-contained trojan horses.…”
Section: Existing Security Approachesmentioning
confidence: 99%
“…The reconfigurable computing area (using programmable circuits -FPGAs) are being used as a technological alternative that can easily interface with a general purpose processor keeping the performance similar to those of dedicated hardware [17,42].…”
Section: Introductionmentioning
confidence: 99%