2018 IEEE 12th International Symposium on Embedded Multicore/Many-Core Systems-on-Chip (MCSoC) 2018
DOI: 10.1109/mcsoc2018.2018.00018
|View full text |Cite
|
Sign up to set email alerts
|

IPRDF: An Isolated Partial Reconfiguration Design Flow for Xilinx FPGAs

Abstract: FPGA devices have been used widely in many industrial domains, but only limitedly in secure and safety-critical applications, which have special requirements for the physical implementation, such as module isolation. This is partly due to limited functionality available with current FPGA vendors' tools and flows. To extend FPGA's appearance in secure and safetycritical applications, we propose an alternative flow for isolation design called the Isolated Partial Reconfiguration Design Flow (IPRDF) in this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 15 publications
(16 reference statements)
0
1
0
Order By: Relevance
“…In order to test and evaluate FPGADefender, we developed several test cases including 1) 15 malicious designs from Table 2 as well as a short-circuit design; and 2) 28 reference designs including the Spector OpenCL benchmark [16], soft-core CPUs (MIPS and RISC-V [70]), crypto cores (AES, DES [64], and SHA3 [49]) and other peripheral circuits [48], which all do not contain any malicious circuits (see Table 5 for the list of malicious circuits and Table 6 for list of all normal test cases).…”
Section: Design Evaluationmentioning
confidence: 99%
“…In order to test and evaluate FPGADefender, we developed several test cases including 1) 15 malicious designs from Table 2 as well as a short-circuit design; and 2) 28 reference designs including the Spector OpenCL benchmark [16], soft-core CPUs (MIPS and RISC-V [70]), crypto cores (AES, DES [64], and SHA3 [49]) and other peripheral circuits [48], which all do not contain any malicious circuits (see Table 5 for the list of malicious circuits and Table 6 for list of all normal test cases).…”
Section: Design Evaluationmentioning
confidence: 99%