2020
DOI: 10.20944/preprints202008.0603.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Secure Boot for Reconfigurable Architectures

Abstract: Reconfigurable computing is becoming ubiquitous in the form of consumer-based Internet of Things (IoT) devices. Reconfigurable computing architectures have found their place in safety-critical infrastructures such as the automotive industry. As the target architecture evolves, it also needs to be updated remotely on the target platform. This process is susceptible to remote hijacking, where the attacker can maliciously update the reconfigurable hardware target with tainted hardware configuration. This paper pr… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…They are part of device resources, affecting the overall device cost, size, and available resources for computing tasks. Intrinsic Physical Unclonable Functions (PUFs) is another tool used for securing IoT devices [21]. PUFs are implemented over Dynamic Random-Access Memory (DRAM) since many IoT devices deploy DRAM modules.…”
Section: Background and Related Workmentioning
confidence: 99%
“…They are part of device resources, affecting the overall device cost, size, and available resources for computing tasks. Intrinsic Physical Unclonable Functions (PUFs) is another tool used for securing IoT devices [21]. PUFs are implemented over Dynamic Random-Access Memory (DRAM) since many IoT devices deploy DRAM modules.…”
Section: Background and Related Workmentioning
confidence: 99%