[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Drimer, 2008 - Google Patents

Volatile FPGA design security–a survey

Drimer, 2008

View PDF
Document ID
1739956774748408426
Author
Drimer S
Publication year
Publication venue
IEEE Computer Society Annual Volume

External Links

Snippet

Volatile FPGAs, the dominant type of programmable logic devices, are used for space, military, automotive, and consumer electronics applications which require them to operate in a wide range of environments. Their continuous growth in both capability and capacity now …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Drimer Volatile FPGA design security–a survey
Zhang et al. Recent attacks and defenses on FPGA-based systems
Drimer Security for volatile FPGAs
Colombier et al. Survey of hardware protection of design data for integrated circuits and intellectual properties
Rostami et al. A primer on hardware security: Models, methods, and metrics
Zhang et al. A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing
Li et al. A survey of hardware Trojan threat and defense
Rajendran et al. Fault analysis-based logic encryption
Duncan et al. FPGA bitstream security: a day in the life
Shakya et al. Introduction to hardware obfuscation: Motivation, methods and evaluation
Liu et al. VLSI supply chain security risks and mitigation techniques: A survey
Zhang et al. Reconfigurable binding against FPGA replay attacks
Vashistha et al. Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance
Zhang et al. A survey on security and trust of FPGA-based systems
WO2017218631A2 (en) A comprehensive framework for protecting intellectual property in the semiconductor industry
Zhang et al. A pragmatic per-device licensing scheme for hardware IP cores on SRAM-based FPGAs
Zhang et al. Enhancing security of FPGA-based embedded systems with combinational logic binding
Halak Cist: A threat modelling approach for hardware supply chain security
Van Woudenberg et al. The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Kokila et al. Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applications
Hutle et al. Resilience against physical attacks
Mohammad et al. Required policies and properties of the security engine of an SoC
Kastner et al. Threats and challenges in reconfigurable hardware security
Baumgarten Preventing integrated circuit piracy using reconfigurable logic barriers
Bu et al. SRASA: A generalized theoretical framework for security and reliability analysis in computing systems