Novel Technique to Enhance Security of Reconfigurable Circuits

نویسندگان

  • BINU K. MATHEW
  • K. P. ZACHARIA
چکیده

FPGAs are used in various applications like aero-space, automotive, military etc which require them to operate in different types of environments. Security of FPGA based system is a big concern as the system developed after lot of research can be stolen very easily. Nowadays, a lot of research is going on, considering various security aspects of FPGAs as the primary concern. Several cryptographic systems are available which can be used to protect FPGA bit-streams. Cryptographic techniques are used to encrypt the FPGA bit-streams. It is not feasible to use FPGAs in small circuit as it increase cost of the system under consideration. This paper proposes a technique which makes a digital system secure by using look-up tables. Behavior of a look-up table is based on its configuration bit. Look-up tables can be used to replace a digital circuit either fully or partially. If a look-up table replaces the whole circuit, then it can be called as fully incomplete and if the look-up table replaces only a part of a digital circuit, then that circuit can be called as partially incomplete. Digital systems can be made secure by fully incomplete design or partially incomplete design. Fully incomplete design can be used in the case of small circuits and for complex circuits a portion of the design can be made incomplete, in the case of partially incomplete digital circuits. This paper proposes a novel technique to enhance security of reconfigurable circuit. An authorized user completes the design of the circuit at run time by entering the configuration bits of the look-up table.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Planning and Operation of the Active and Reactive sources Constrained to Voltage Security in the Reconfigurable Smart Distribution Network

One of the most important objectives of smart distribution networks (SDNs) is to achieve a secure and reliable network. This can be realized by optimal operation in the presence of active power sources such as the distributed generations (DGs), reactive power sources such as switched capacitor bank (SCB), active loads such as the demand response program (DRP), and various network management str...

متن کامل

A Sub-µW Tuneable Switched-Capacitor Amplifier-Filter for Neural Recording Using a Class-C Inverter

A two stage sub-µW Inverter-based switched-capacitor amplifier-filter is presented which is capable of amplifying both spikes and local field potentials (LFP) signals. Here we employ a switched capacitor technique for frequency tuning and reducing of 1/f noise of two stages. The reduction of power consumption is very necessary for neural recording devices however, in switched capacitor (SC) cir...

متن کامل

Novel Reconfigurable Silicon Physical Unclonable Functions

Physical Unclonable Functions (PUFs) are novel circuit primitives which store secret keys in silicon circuits by exploiting uncontrollable randomness due to manufacturing process variations. Previous work has mainly focused on static challenge-response behaviors. However, it has already been shown that a reconfigurable architecture of PUF will not only enable PUFs to meet practical application ...

متن کامل

Implementation of VlSI Based Image Compression Approach on Reconfigurable Computing System - A Survey

Image data require huge amounts of disk space and large bandwidths for transmission. Hence, imagecompression is necessary to reduce the amount of data required to represent a digital image. Thereforean efficient technique for image compression is highly pushed to demand. Although, lots of compressiontechniques are available, but the technique which is faster, memory efficient and simple, surely...

متن کامل

Granidt: Towards Gigabit Rate Network Intrusion Detection Technology

We describe a novel application of reconfigurable computing to the problem of computer network security. By filtering network packets with customized logic circuits, we can search headers as well as packet content for specific signatures at Gigabit Ethernet line rate. Input to our system is a set of filter rule descriptions in the format of the public domain “snort” databases. These description...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014