2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig) 2016
DOI: 10.1109/reconfig.2016.7857187
|View full text |Cite
|
Sign up to set email alerts
|

Robust bitstream protection in FPGA-based systems through low-overhead obfuscation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
15
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(19 citation statements)
references
References 8 publications
1
15
0
Order By: Relevance
“…However, in our threat model, the chip manufacturer is trusted and therefore this problem is out-of-scope. It can be solved by applying obfuscation techniques proposed previously [37,46,79].…”
Section: Loading and Attesting Trustmodmentioning
confidence: 99%
“…However, in our threat model, the chip manufacturer is trusted and therefore this problem is out-of-scope. It can be solved by applying obfuscation techniques proposed previously [37,46,79].…”
Section: Loading and Attesting Trustmodmentioning
confidence: 99%
“…This has inspired researchers to develop newer and more sophisticated security protocols, including protocols that are inspired by biology and species diversity. There have been many research endeavors that propose bio-inspired security protocols for the secure deployment of hardware [26,37,59,40] and software [11,4,28], as well as security protocols to protect networks and cyberspace [44,15] and to ensure data privacy and security [22,12]. In general, diversity of a species at the genetic level is necessary for the overall survival of that species.…”
Section: Bio-diversity Inspired Securitymentioning
confidence: 99%
“…AES-GCM and RSA are used in Xilinx high end FPGA boards in order to provide protection and authentication of bitstream [22,23]. In [24], Karam proposes an obfuscation based approach for protecting the bitstream. Swierczynski et.al [25] shows how an encrypted bitstream can be reverse engineered so that an attacker can insert Trojans on to bitstream and goes undetected.…”
Section: Fig 1 Overall View Of Hardware Acceleration Processmentioning
confidence: 99%