Abstract:
As field programmable gate arrays (FPGAs) become more widely used, security concerns have been raised regarding FPGA use for cryptographic, sensitive, or proprietary data...Show MoreMetadata
Abstract:
As field programmable gate arrays (FPGAs) become more widely used, security concerns have been raised regarding FPGA use for cryptographic, sensitive, or proprietary data. Storing or implementing proprietary code and designs on FPGAs could result in the compromise of sensitive information if the FPGA device was physically relinquished or remotely accessible to adversaries seeking to obtain the information. A hardware description language (HDL) FPGA architecture supporting dynamic reconfiguration through granular reconfiguration control is presented for use in security applications. Testing validates the reconfiguration results and compares power usage, timing, and area estimates from a conventional and Dynamically Reconfigurable FPGA (DRFPGA) model.
Date of Conference: 08-10 December 2008
Date Added to IEEE Xplore: 27 January 2009
ISBN Information:
References is not available for this document.
Select All
1.
S. Dueck and W. Kinsner. Netlist partitioning for fpga-based run-time reconfiguration. In IEEE Canadian Conference on Electrical and Computer Engineering - CCECE02, volume 2, pages 584-590, 2002.
2.
D. N. M. T. H. Bar-El, H. Choukri and C. The sorcerers apprentice guide to fault attacks. Proceedings of the IEEE, 94(2):370-382, February 2006.
3.
Y.-C. Jiang. Minimum communication cost approaches for dynamically reconfigurable fpga. Signals, Circuits and Systems, 2007. ISSCS 2007. International Symposium on, 1:1-4, 13-14 July 2007.
4.
Z. Kamawal. Experimental power analysis attacks on an fpga. Oregon State University ECE679 Project, 2004.
5.
W.-K. Mak and E. F. Y. Young. Temporal logic replication for dynamically reconfigurable fpga partitioning. In ISPD 02: Proceedings of the 2002 international symposium on Physical design, pages 190-195, New York, NY, USA, 2002. ACM.
6.
J. Paul, S. Stone, Y. Kim, and R. Bennington. A method and architecture for real-time polymorphic reconfiguration. In ICFPT07: International Conference on Field-Programmable Technology 2007, Kokurakita, Kitakyushu, Japan, December 2007.
7.
T. Wollinger and C. Paar. How secure are fpgas in cryptographic applications. Report 2003/119, German Federal Office for Information Security (BSI)., 2003.