The future of FPGA acceleration in datacenters and the cloud

C Bobda, JM Mbongue, P Chow, M Ewais… - ACM Transactions on …, 2022 - dl.acm.org
In this article, we survey existing academic and commercial efforts to provide Field-
Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a …

Design of hardware trojans and its impact on cps systems: A comprehensive survey

A Dhavlle, R Hassan, M Mittapalli… - … on Circuits and …, 2021 - ieeexplore.ieee.org
The ever-increasing demand for sophisticated cyber-physical systems (CPS), combined with
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …

On exploiting message leakage in (few) NIST PQC candidates for practical message recovery attacks

P Ravi, S Bhasin, SS Roy… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, we propose generic and practical side-channel attacks for message recovery in
post-quantum lattice-based public key encryption (PKE) and key encapsulation mechanisms …

A survey of algorithmic methods in IC reverse engineering

L Azriel, J Speith, N Albartus, R Ginosar… - Journal of Cryptographic …, 2021 - Springer
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology
itself. It grew out of the need to analyze competitor's products and detect possible IP …

FPGA-chain: Enabling holistic protection of FPGA supply chain with blockchain technology

T Zhang, F Rahman, M Tehranipoor… - IEEE Design & …, 2022 - ieeexplore.ieee.org
Field-programmable gate array (FPGA) bitstream reverse engineering and counterfeiting is
a pertinent challenge in the modern hardware supply chain. To this end, this article …

Real-world snapshots vs. theory: Questioning the t-probing security model

T Krachenfels, F Ganji, A Moradi… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …

{PISTIS}: Trusted computing architecture for low-end embedded systems

M Grisafi, M Ammar, M Roveri, B Crispo - 31st USENIX Security …, 2022 - usenix.org
Recently, several hardware-assisted security architectures have been proposed to mitigate
the ever-growing cyber-attacks on Internet-connected devices. However, such proposals are …

(Security) Assertions by Large Language Models

R Kande, H Pearce, B Tan… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The security of computer systems typically relies on a hardware root of trust. As
vulnerabilities in hardware can have severe implications on a system, there is a need for …

Trusted configuration in cloud FPGAs

S Zeitouni, J Vliegen, T Frassetto… - 2021 IEEE 29th …, 2021 - ieeexplore.ieee.org
In this paper we tackle the open paradoxical challenge of FPGA-accelerated cloud
computing: On one hand, clients aim to secure their Intellectual Property (IP) by encrypting …

A Zero Trust-based framework employed by Blockchain Technology and Ring Oscillator Physical Unclonable Functions for security of Field Programmable Gate Array …

A Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from
untrusted participants involved, resulting in the significant research being conducted in this …