Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,430 Hits in 4.7 sec

Complete activation scheme for FPGA-oriented IP cores design protection

Brice Colombier, Ugo Mureddu, Marek Laban, Oto Petura, Lilian Bossuet, Viktor Fischer
2017 2017 27th International Conference on Field Programmable Logic and Applications (FPL)  
We propose a hardware/software scheme which allows a designer to remotely activate an IP with minimal area overhead. The software modifies the IP efficiently and can handle very large netlists.  ...  The protected IP is instantiated on the enrolled daughterboard. Before activation, the IP does not operate correctly.  ...  the frame of the SALWARE project number ANR-13-JS03-0003 supported by the French "Agence Nationale de la Recherche" and by the French "Fondation de Recherche pour l'Aéronautique et l'Espace", funding for  ... 
doi:10.23919/fpl.2017.8056772 dblp:conf/fpl/ColombierMLPBF17 fatcat:rdhxug3ci5c2ndrjks4k7drjdi

Hardware Activation by Means of PUFs and Elliptic Curve Cryptography in Field-Programmable Devices

Luis Parrilla, Encarnación Castillo, Diego Morales, Antonio García
2016 Electronics  
Reusable design using IP cores requires of efficient methods for protecting the Intellectual Property of the designer and the corresponding license agreements.  ...  This secure channel allows the IP core vendor to send a unique Activation Code to the core in order to switch it to the Activated Mode, thus enabling all its features.  ...  Parrilla is the author of the ideas and designs corresponding to the SEHAS protection system. E.  ... 
doi:10.3390/electronics5010005 fatcat:ez3m74kcdvgexce6evo7sho34m

PUF-based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment

Jing Long, Wei Liang, Kuan-Ching Li, Dafang Zhang, Mingdong Tang, Haibo Luo
2019 IEEE Access  
To protect software IP, IP core vendor inserts copyright information and anonymous buyer identity information into the design before trading.  ...  As an ideal hardware solution, field programmable gate array (FPGA) becomes a mainstream technology to design a complex system. The designed modules are named as intellectual property (IP) cores.  ...  Therefore, an IP core is binding to a specific FPGA device. This scheme assumes system integration vendor is completely trustable. All CRPs of PUF in FPGA are stored by the system integration vendor.  ... 
doi:10.1109/access.2019.2925106 fatcat:kdn643u5pjd2hlxbl67yeuxiae

Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing

Yier Jin, Bo Yang, Yiorgos Makris
2013 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)  
We propose a new information assurance model which can dynamically track the information flow in circuit designs and hence protect sensitive data from malicious leakage.  ...  The proposed cycle accurate information assurance scheme is successfully demonstrated on cryptographic circuits with various complexities from a small-scale DES encryption core to a state-ofthe-art AES  ...  The increasing reliance on third-party IP cores for hierarchical designs makes it more important to protect IP cores against RTL Trojans.  ... 
doi:10.1109/hst.2013.6581573 dblp:conf/host/JinYM13 fatcat:2qdaa3yb5ng63o6jhqdqhs5mku

Analysis and design of active IC metering schemes

Roel Maes, Dries Schellekens, Pim Tuyls, Ingrid Verbauwhede
2009 2009 IEEE International Workshop on Hardware-Oriented Security and Trust  
Outsourcing the fabrication of semiconductor devices to merchant foundries raises some issues concerning the IP protection of the design.  ...  Active hardware metering schemes try to counter piracy of integrated circuits by enforcing the fabrication plant to run an activation protocol with the IP owner for every chip that is produced.  ...  ACKNOWLEDGMENTS This work was in part supported by the IAP Program P6/26 BCRYPT of the Belgian State, by K.U.Leuven-BOF funding (OT/06/04), by the FWO project G.0300.07 (Security components for trusted  ... 
doi:10.1109/hst.2009.5224964 dblp:conf/host/MaesSTV09 fatcat:ztobilkk2jaczb6lnra4h35hb4

Design and implementation of an industrial vector-controlled induction motor drive

Jose Titus, M Vamshikrishna, B Sekhar, B J Rajendra, K Hatua, K Vasudevan, A Koteswara Rao, Shoubhik Mukherjee, S Eswar Rao, B P Muni
2017 Sadhana (Bangalore)  
Various monitoring and protection functions for the drive are implemented using a Cyclone IV FPGA that communicates with the DSC, and acts as the master controller for the drive.  ...  This paper describes the implementation of a complete industrial vectorcontrolled drive for a 30 kW induction motor.  ...  The FPGA side configuration showing the NIOS core along with connected IP cores and block diagram logic is shown in figure 4 .  ... 
doi:10.1007/s12046-017-0660-6 fatcat:jabcvlecv5bddouvv3hc7v3fny

On the Power of Optical Contactless Probing

Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
We demonstrate that the adversary is able to extract the plaintext data containing sensitive design information and intellectual property (IP).  ...  To this end, we conduct an optical probing attack against the bitstream encryption feature of a common FPGA.  ...  An additional advantage of this protection scheme is that it can also be employed by FPGA users on the reconfigurable logic without the need for hardware modifications.  ... 
doi:10.1145/3133956.3134039 dblp:conf/ccs/TajikLSB17 fatcat:dhzonae3ongybelyiostl56fna

Security of Cloud FPGAs: A Survey [article]

Chenglu Jin, Vasudev Gohil, Ramesh Karri, Jeyavijayan Rajendran
2020 arXiv   pre-print
However, since the cloud FPGA technology is still in its infancy, the security implications of this integration of FPGAs in the cloud are not clear.  ...  In this paper, we survey the emerging field of cloud FPGA security, providing a comprehensive overview of the security issues related to cloud FPGAs, and highlighting future challenges in this research  ...  These are indicated in the figure by devil icons in the shell (PCIe module and IP core), user 1's logic, 3rd party IP core, and the FPGA design flow, respectively.  ... 
arXiv:2005.04867v1 fatcat:yr2habmipvfnbn64yvczvapi34

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud [article]

Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi
2020 arXiv   pre-print
We conclude with our insights and a call for future research to tackle these challenges.  ...  This is enabled by leveraging the partial reconfiguration property of FPGAs, which allows to split the FPGA fabric into several logically isolated regions and reconfigure the functionality of each region  ...  These built-in crypto cores are not exclusive for bitstream protection; they can be used by the users in their designs as well.  ... 
arXiv:2009.13914v2 fatcat:mbdpjfuoljderjhopoppxkxkoe

ECC Memory for Fault Tolerant RISC-V Processors [chapter]

Alexander Dörflinger, Yejun Guan, Sören Michalik, Sönke Michalik, Jamin Naghmouchi, Harald Michalik
2020 Lecture Notes in Computer Science  
The same applies for RISC-V ecosystems that allow to implement System-on-Chips with RISC-V processors on ASICs or FPGAs.  ...  Numerous processor cores based on the popular RISC-V Instruction Set Architecture have been developed in the past few years and are freely available.  ...  Hereby the newly created ECCmem component goes beyond existing IP such as Synopsis Design-Ware STAR ECC IP, the ARM Artisan embedded memory IP, and Xilinx ECC IP [14] .  ... 
doi:10.1007/978-3-030-52794-5_4 fatcat:el2loaxezzc3dkqiz5lh6a2w2e

Encryption AXI Transaction Core for Enhanced FPGA Security

Jesús Lázaro, Armando Astarloa, Leire Muguira, Unai Bidarte, Jaime Jiménez
2022 Electronics  
The core prevents unauthorized data extraction by encrypting data on the fly.  ...  The core is compatible with AXI and is based on a Trivium stream cipher. Its implementation has been tested on a Zynq platform.  ...  Firewall IP cores have been developed to protect the SoC from malicious software [30] . This passive security is achieved by active built-in security measures.  ... 
doi:10.3390/electronics11203361 fatcat:vb6v6fopv5bmbl7rvp6g2e26jm

FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review

Abdulmajeed Adil Yazdeen, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, Rizgar R. Zebari
2021 Qubahan Academic Journal  
In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network.  ...  Since FPGAs can be defined as just one mission, computers are superior to them.  ...  The paper also examined the hardware architecture for the efficient implementation of the proposed FPGA cipher core of the RC6-Cascade stack.  ... 
doi:10.48161/qaj.v1n2a38 fatcat:5sibubug4nhdzlp7on7ujvupta

PIL testing of the Optical On-board Image Processing Solution for EO-ALERT

Francisco Membibre, Antonio Latorre, Alexis Ramos, Juan Ignacio Bravo, Robert Hinz, Álvaro Morón, Murray Kerr
2021 Zenodo  
Once the platform is ready, the new tools for programming Xilinx® COTS allow using all board resources such as IP cores in the FPGA for hardware acceleration or the use of parallel processing frameworks  ...  (4 A53 ARM® cores) or FPGA.  ...  We thank and acknowledge our partners DLR, OHB Italy, POLITO, TU-GRAZ, DEIMOS Imaging, for their collaboration and effort to achieve the project objectives.  ... 
doi:10.5281/zenodo.5575574 fatcat:dz3ceasnqfa23j3xqxm523dzsu

Dynamically configurable security for SRAM FPGA bitstreams

Lilian Bossuet, Guy Gogniat, Wayne Burleson
2006 International Journal of Embedded Systems  
FPGAs are becoming increasingly attractive -thanks to the improvement of their capacities and their performances. Today, FPGAs represent an efficient design solution for numerous systems.  ...  His researches are in reconfigurable computing and particularly design space exploration for coarse-grained reconfigurable architecture.  ...  This work was supported in part by the French Ministry for Education and Research.  ... 
doi:10.1504/ijes.2006.010166 fatcat:s3xphvilkvbmhezlioklcxdlsa

FPGA-based module for SURF extraction

Tomáš Krajník, Jan Šváb, Sol Pedre, Petr Čížek, Libor Přeučil
2014 Machine Vision and Applications  
We present a complete hardware and software solution of an FPGA-based computer vision embedded module capable of carrying out SURF image features extraction algorithm.  ...  We describe the module hardware as well as the custom FPGA image processing cores that implement the algorithm's most computationally expensive process, the interest point detection.  ...  If the user would wish to change these, he would need to modify the FPGA design only on the system level withouth altering the IP cores.  ... 
doi:10.1007/s00138-014-0599-0 fatcat:dj3ddob3xjeuroamg67olae46q
« Previous Showing results 1 — 15 out of 1,430 results