Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose
نویسندگان
چکیده مقاله:
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA programmer. The issue of secure transmission of configuration information to the FPGAs is of paramount importance to both users and IP providers. In this paper we presented a "Self Authentication" methodology in which the originality of sub-components in bitstream is authenticated in parallel with the intrinsic operation of the design. In the case of discovering violation, the normal data flow is obfuscated and the circuit would be locked. Experimental results show that this methodology considerably improves the IP security against malicious updates with reasonable overheads.
منابع مشابه
Design Principles for Tamper-Resistant Smartcard Processors
We describe techniques for extracting protected software and data from smartcard processors. This includes manual microprobing, laser cutting, focused ion-beam manipulation, glitch attacks, and power analysis. Many of these methods have already been used to compromise widely-fielded conditionalaccess systems, and current smartcards offer little protection against them. We give examples of lowco...
متن کاملAn Efficient LUT Design on FPGA for Memory-Based Multiplication
An efficient Lookup Table (LUT) design for memory-based multiplier is proposed. This multiplier can be preferred in DSP computation where one of the inputs, which is filter coefficient to the multiplier, is fixed. In this design, all possible product terms of input multiplicand with the fixed coefficient are stored directly in memory. In contrast to an earlier proposition Odd Multiple Storage ...
متن کاملLocal Content Based Image Authentication for Tamper Localization
Digital images make up a large component in the multimedia information. Hence Image authentication has attained a great importance and lead to the development of several image authentication algorithms. This paper proposes a block based watermarking scheme for image authentication based on the edge information extracted from each block. A signature is calculated from each edge block of the imag...
متن کاملteam teaching in english for academic purpose classrooms
تحقیق حاضر به منظور بررسی کارآیی بین دو روش تدریس زبان انگلیسی با اهداف دانشگاهی به نامهای تدریس گروهی و تدریس انفرادی انجام شد. بدین منظور، سه کلاس انگلیسی با اهداف دانشگاهی مربوط به دانشجویان رشته جغرافیا، کامپیوتر و فقه و حقوق به روش گروهی توسط یک مدرس زبان انگلیسی و یک مدرس درس تخصصی در استان یزد در طول ترم پاییز سال تحصیلی 1390-1389 تدریس گردید. همزمان، سه کلاس زبان انگلیسی دیگر با اهداف د...
15 صفحه اولSecure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec’11, Li et al. showed that Kim and Chung’s passwordbased remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an...
متن کاملAn Optimized Design Flow for Fast FPGA-Based Rapid Prototyping
In this paper, we present an optimized design flow to map Register-Transfer-Level (RTL) netlists onto multiple-FPGA architectures. Our FPGA-dedicated method fully exploits design structure by letting the basic design steps technology mapping, hierarchical partitioning, floorplanning and signal flow driven placement, interact. This efficiently reduces runtime and yields design implementations of...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 8 شماره 1
صفحات 53- 60
تاریخ انتشار 2016-01-04
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023