Hardware obfuscation and logic locking: A tutorial introduction
If you are designing or integrating hardware IP blocks into your designs, and you are using
common global supply chains, then reading this overview article on how to protect your IP …
common global supply chains, then reading this overview article on how to protect your IP …
Thwarting security threats from malicious FPGA tools with novel FPGA-oriented moving target defense
Z Zhang, L Njilla, CA Kamhoua… - IEEE Transactions on Very …, 2018 - ieeexplore.ieee.org
The increasing usage and popularity of the field-programmable gate array (FPGA) systems
bring in security concerns. Existing countermeasures are mostly based on the assumption …
bring in security concerns. Existing countermeasures are mostly based on the assumption …
FPGA Bitstream Modification: Attacks and Countermeasures
M Moraitis - IEEE Access, 2023 - ieeexplore.ieee.org
Advances in Field-Programmable Gate Array (FPGA) technology in recent years have
resulted in an expansion of its usage in a very wide spectrum of applications. Apart from …
resulted in an expansion of its usage in a very wide spectrum of applications. Apart from …
Lightweight micro-architecture for IoT & FPGA security
R Chakraborty, UK Mondal, A Debnath… - International Journal of …, 2023 - Springer
Cryptographic standards were created with the goal of being able to work on a wide range of
systems. Small computing systems with limited capacity to implement cryptography have …
systems. Small computing systems with limited capacity to implement cryptography have …
Turning the table: Using bitstream reverse engineering to detect FPGA trojans
According to recent reports and surveys over the last 2 years, field-programmable gate
arrays (FPGAs) have increasingly become the prime targets for carrying out extremely …
arrays (FPGAs) have increasingly become the prime targets for carrying out extremely …
Hidden in plaintext: An obfuscation-based countermeasure against FPGA bitstream tampering attacks
Field Programmable Gate Arrays (FPGAs) have become an attractive choice for diverse
applications due to their reconfigurability and unique security features. However, designs …
applications due to their reconfigurability and unique security features. However, designs …
Securing FPGA-based obsolete component replacement for legacy systems
Component-aging is unavoidable in legacy systems. Although re-designing the system
typically results in a high cost, the need to replace aged components for legacy systems is …
typically results in a high cost, the need to replace aged components for legacy systems is …
Diversity-by-design for dependable and secure cyber-physical systems: A survey
Diversity-based security approaches have been studied for several decades since the
1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …
1970s. The concept of diversity-by-design emerged in the 1980s. Since then, diversity …
On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
Evolvable hardware (EH) architectures are capable of changing their configuration and
behavior dynamically based on inputs from the environment. In this paper, we investigate …
behavior dynamically based on inputs from the environment. In this paper, we investigate …
Proactive defense against security threats on iot hardware
The increasing popularity of Internet of Things (IoT) devices brings in new security concerns,
due to their limited resources for protection schemes and the difficulty of managing …
due to their limited resources for protection schemes and the difficulty of managing …