Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose
Authors
Abstract:
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA programmer. The issue of secure transmission of configuration information to the FPGAs is of paramount importance to both users and IP providers. In this paper we presented a "Self Authentication" methodology in which the originality of sub-components in bitstream is authenticated in parallel with the intrinsic operation of the design. In the case of discovering violation, the normal data flow is obfuscated and the circuit would be locked. Experimental results show that this methodology considerably improves the IP security against malicious updates with reasonable overheads.
similar resources
Design Principles for Tamper-Resistant Smartcard Processors
We describe techniques for extracting protected software and data from smartcard processors. This includes manual microprobing, laser cutting, focused ion-beam manipulation, glitch attacks, and power analysis. Many of these methods have already been used to compromise widely-fielded conditionalaccess systems, and current smartcards offer little protection against them. We give examples of lowco...
full textAn Efficient LUT Design on FPGA for Memory-Based Multiplication
An efficient Lookup Table (LUT) design for memory-based multiplier is proposed. This multiplier can be preferred in DSP computation where one of the inputs, which is filter coefficient to the multiplier, is fixed. In this design, all possible product terms of input multiplicand with the fixed coefficient are stored directly in memory. In contrast to an earlier proposition Odd Multiple Storage ...
full textLocal Content Based Image Authentication for Tamper Localization
Digital images make up a large component in the multimedia information. Hence Image authentication has attained a great importance and lead to the development of several image authentication algorithms. This paper proposes a block based watermarking scheme for image authentication based on the edge information extracted from each block. A signature is calculated from each edge block of the imag...
full textteam teaching in english for academic purpose classrooms
تحقیق حاضر به منظور بررسی کارآیی بین دو روش تدریس زبان انگلیسی با اهداف دانشگاهی به نامهای تدریس گروهی و تدریس انفرادی انجام شد. بدین منظور، سه کلاس انگلیسی با اهداف دانشگاهی مربوط به دانشجویان رشته جغرافیا، کامپیوتر و فقه و حقوق به روش گروهی توسط یک مدرس زبان انگلیسی و یک مدرس درس تخصصی در استان یزد در طول ترم پاییز سال تحصیلی 1390-1389 تدریس گردید. همزمان، سه کلاس زبان انگلیسی دیگر با اهداف د...
15 صفحه اولSecure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec’11, Li et al. showed that Kim and Chung’s passwordbased remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an...
full textAn Optimized Design Flow for Fast FPGA-Based Rapid Prototyping
In this paper, we present an optimized design flow to map Register-Transfer-Level (RTL) netlists onto multiple-FPGA architectures. Our FPGA-dedicated method fully exploits design structure by letting the basic design steps technology mapping, hierarchical partitioning, floorplanning and signal flow driven placement, interact. This efficiently reduces runtime and yields design implementations of...
full textMy Resources
Journal title
volume 8 issue 1
pages 53- 60
publication date 2016-01-04
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023