2007 IEEE Symposium on Security and Privacy (SP '07) 2007
DOI: 10.1109/sp.2007.28
|View full text |Cite
|
Sign up to set email alerts
|

Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0
1

Year Published

2008
2008
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(47 citation statements)
references
References 41 publications
0
46
0
1
Order By: Relevance
“…Реализация сложного реконфигурируемого логического про-екта, как правило, основывается на интеграции нескольких IP-блоков. В работе [20] предложена идея "рвов и подъемных мостов" как изоляцион-ных примитивов, которые применяются в слу-чае использования нескольких IP-блоков. Они позволяют блокировать нелегальные ответвления и нелегальные межсоединения внутри реконфи-гурируемых блоков.…”
Section: Reconfigurable Architectureunclassified
See 1 more Smart Citation
“…Реализация сложного реконфигурируемого логического про-екта, как правило, основывается на интеграции нескольких IP-блоков. В работе [20] предложена идея "рвов и подъемных мостов" как изоляцион-ных примитивов, которые применяются в слу-чае использования нескольких IP-блоков. Они позволяют блокировать нелегальные ответвления и нелегальные межсоединения внутри реконфи-гурируемых блоков.…”
Section: Reconfigurable Architectureunclassified
“…Implementation of a complex reconfigurable logical project, usually is based on the integration of multiple IP blocks. In [20] the idea of "moats and drawbridges" as isolation primitives is proposed, which are used in case of multiple IP blocks. They help block illegal arms and interconnects inside the reconfigurable blocks.…”
Section: #2 / 72 / 2017mentioning
confidence: 99%
“…It leads to a latency penalty which should be avoided to mitigate security overhead. Other works provide solutions for the protection of embedded systems: Huffmire et al [7] introduce the approach of physi-cal isolation using moats and drawbridges; ARM proposes a commercial architecture name Trustzone [8] which is based on a normal/secure separation using a secure kernel and an access driver. This work is an in-depth description and implementation study of the solution introduced in [2].…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, wireless security imposes a technically challenging set of objectives and requirements. For example, side channel and fault induction security attacks [18] [19][24] [32][41] [45] are much more likely on cell phones and, in particular, on sensor nodes that may be deployed in unprotected or even hostile environments. Also, operational conditions and numerous design constraints such as low energy, low power, and low cost impose difficulties on security requirements.…”
Section: Motivationmentioning
confidence: 99%