Drimer, 2008 - Google Patents
Volatile FPGA design security–a surveyDrimer, 2008
View PDF- Document ID
- 1739956774748408426
- Author
- Drimer S
- Publication year
- Publication venue
- IEEE Computer Society Annual Volume
External Links
Snippet
Volatile FPGAs, the dominant type of programmable logic devices, are used for space, military, automotive, and consumer electronics applications which require them to operate in a wide range of environments. Their continuous growth in both capability and capacity now …
- 238000011160 research 0 abstract description 27
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Drimer | Volatile FPGA design security–a survey | |
Zhang et al. | Recent attacks and defenses on FPGA-based systems | |
Drimer | Security for volatile FPGAs | |
Colombier et al. | Survey of hardware protection of design data for integrated circuits and intellectual properties | |
Rostami et al. | A primer on hardware security: Models, methods, and metrics | |
Zhang et al. | A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing | |
Li et al. | A survey of hardware Trojan threat and defense | |
Rajendran et al. | Fault analysis-based logic encryption | |
Duncan et al. | FPGA bitstream security: a day in the life | |
Shakya et al. | Introduction to hardware obfuscation: Motivation, methods and evaluation | |
Liu et al. | VLSI supply chain security risks and mitigation techniques: A survey | |
Zhang et al. | Reconfigurable binding against FPGA replay attacks | |
Vashistha et al. | Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance | |
Zhang et al. | A survey on security and trust of FPGA-based systems | |
WO2017218631A2 (en) | A comprehensive framework for protecting intellectual property in the semiconductor industry | |
Zhang et al. | A pragmatic per-device licensing scheme for hardware IP cores on SRAM-based FPGAs | |
Zhang et al. | Enhancing security of FPGA-based embedded systems with combinational logic binding | |
Halak | Cist: A threat modelling approach for hardware supply chain security | |
Van Woudenberg et al. | The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks | |
Kokila et al. | Resource efficient metering scheme for protecting SoC FPGA device and IPs in IOT applications | |
Hutle et al. | Resilience against physical attacks | |
Mohammad et al. | Required policies and properties of the security engine of an SoC | |
Kastner et al. | Threats and challenges in reconfigurable hardware security | |
Baumgarten | Preventing integrated circuit piracy using reconfigurable logic barriers | |
Bu et al. | SRASA: A generalized theoretical framework for security and reliability analysis in computing systems |