6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC) 2011
DOI: 10.1109/recosoc.2011.5981501
|View full text |Cite
|
Sign up to set email alerts
|

Secure remote reconfiguration of an FPGA-based embedded system

Abstract: This paper describes the protocol, architecture, and implementation details of an FPGA-based embedded system that is able to remotely reconfigure the FPGA, using a TCP/IP connection, in a secure way. When considering the security aspects, we imply data confidentiality, explicit key authentication and data origin authentication. Since these aspects are overhead for the main application, the system is to be as small as possible. Therefore we have focused on compactness rather than on speed for the implementation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…With a relative usage of around 35%, Table I shows the cost of the static partition is high. The cryptocore is designed with a focus on area and is relatively small [8]. The additional resources used by the static partition are spent on the MicroBlaze with the accompanying bus and the remaining IP cores.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…With a relative usage of around 35%, Table I shows the cost of the static partition is high. The cryptocore is designed with a focus on area and is relatively small [8]. The additional resources used by the static partition are spent on the MicroBlaze with the accompanying bus and the remaining IP cores.…”
Section: Resultsmentioning
confidence: 99%
“…In [8], Braeken et al describe an on-line system handling incoming bitstreams, providing data confidentiality and authentication, and mutual explicit key authentication. Their work uses external flash memory to store the incoming bitstream, which means the FPGA goes off-line between configurations which could threaten the security.…”
Section: A Remote Reconfiguration Of An Fpgamentioning
confidence: 99%
“…However, the system proposed in [24] requires a complex control unit and configuring it also takes longer. Since this first work many propositions target static and partial secure reconfiguration [20][21][22][23]25,26]. Even recent FPGAs, such as Xilinx Virtex-6 and Virtex 7, propose security scheme for static and partial reconfiguration [27].…”
Section: State Of the Art Of Secure Fpga Configurationmentioning
confidence: 99%
“…This key exchange must be secured using a cryptographic algorithm. One such solution would be to use a public key encryption algorithm such as RSA or ECC [25,26]. In general, implementation of public key algorithms is more expensive (as they often require processors and crypto-processors) and they are slower than symmetric key algorithms [9,14].…”
Section: State Of the Art Of Secure Fpga Configurationmentioning
confidence: 99%
See 1 more Smart Citation