2017 30th IEEE International System-on-Chip Conference (SOCC) 2017
DOI: 10.1109/socc.2017.8226019
|View full text |Cite
|
Sign up to set email alerts
|

Securing FPGA SoC configurations independent of their manufacturers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Unterstein et al showed an implementation of a patchable bitstream encryption scheme on the Zynq-7000 platform [54], which is a realization of [38]. There are several variations of the same idea reported in references [19,21,22]. Note that the Zynq-7000, UltraScale and UltraScale+ devices have the needed public key scheme, while the 7-Series and older devices have not.…”
Section: Patchable Bitstream Encryptionmentioning
confidence: 99%
“…Unterstein et al showed an implementation of a patchable bitstream encryption scheme on the Zynq-7000 platform [54], which is a realization of [38]. There are several variations of the same idea reported in references [19,21,22]. Note that the Zynq-7000, UltraScale and UltraScale+ devices have the needed public key scheme, while the 7-Series and older devices have not.…”
Section: Patchable Bitstream Encryptionmentioning
confidence: 99%
“…Traditional solutions provide a unique key for every device stored in an NVM; however, the solution is prone to some read-back attacks [9]. A better solution is to deploy a clone-resistant device ID such as a PUF [10][11][12][13] in conjunction with the secure boot mechanism. Our proposed solution is introducing a digital SUC-based secured booting as proposed in [14], which is more resilient and practical for mass production than the analog PUF-technology solution seen in Section 5.1.…”
Section: Device Physical-layer Operational Security Requirementsmentioning
confidence: 99%
“…The white paper also lacks an analysis of the overall system security, and the various attack vectors which we later discuss are not considered. An implementation of that scheme was later published by Jacob et al [16] where they use AES in Galois counter mode (GCM) for decryption and authentication with a twisted bistable ring PUF for the key storage. Their implementation is basic in the way that it provided no comprehensive evaluation of the used PUF and contains no countermeasures against sidechannel attacks.…”
Section: Related Workmentioning
confidence: 99%