The future of FPGA acceleration in datacenters and the cloud
In this article, we survey existing academic and commercial efforts to provide Field-
Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a …
Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a …
Design of hardware trojans and its impact on cps systems: A comprehensive survey
The ever-increasing demand for sophisticated cyber-physical systems (CPS), combined with
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …
the fabless model, led to vulnerability exploits in the IC supply chain, especially the insertion …
On exploiting message leakage in (few) NIST PQC candidates for practical message recovery attacks
In this work, we propose generic and practical side-channel attacks for message recovery in
post-quantum lattice-based public key encryption (PKE) and key encapsulation mechanisms …
post-quantum lattice-based public key encryption (PKE) and key encapsulation mechanisms …
A survey of algorithmic methods in IC reverse engineering
The discipline of reverse engineering integrated circuits (ICs) is as old as the technology
itself. It grew out of the need to analyze competitor's products and detect possible IP …
itself. It grew out of the need to analyze competitor's products and detect possible IP …
FPGA-chain: Enabling holistic protection of FPGA supply chain with blockchain technology
Field-programmable gate array (FPGA) bitstream reverse engineering and counterfeiting is
a pertinent challenge in the modern hardware supply chain. To this end, this article …
a pertinent challenge in the modern hardware supply chain. To this end, this article …
Real-world snapshots vs. theory: Questioning the t-probing security model
Due to its sound theoretical basis and practical efficiency, masking has become the most
prominent countermeasure to protect cryptographic implementations against physical side …
prominent countermeasure to protect cryptographic implementations against physical side …
{PISTIS}: Trusted computing architecture for low-end embedded systems
Recently, several hardware-assisted security architectures have been proposed to mitigate
the ever-growing cyber-attacks on Internet-connected devices. However, such proposals are …
the ever-growing cyber-attacks on Internet-connected devices. However, such proposals are …
(Security) Assertions by Large Language Models
The security of computer systems typically relies on a hardware root of trust. As
vulnerabilities in hardware can have severe implications on a system, there is a need for …
vulnerabilities in hardware can have severe implications on a system, there is a need for …
Trusted configuration in cloud FPGAs
In this paper we tackle the open paradoxical challenge of FPGA-accelerated cloud
computing: On one hand, clients aim to secure their Intellectual Property (IP) by encrypting …
computing: On one hand, clients aim to secure their Intellectual Property (IP) by encrypting …
A Zero Trust-based framework employed by Blockchain Technology and Ring Oscillator Physical Unclonable Functions for security of Field Programmable Gate Array …
A Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
The field programmable gate array (FPGA) supply chain is vulnerable to security issues from
untrusted participants involved, resulting in the significant research being conducted in this …
untrusted participants involved, resulting in the significant research being conducted in this …