2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2018
DOI: 10.1109/hst.2018.8383919
|View full text |Cite
|
Sign up to set email alerts
|

Self-authenticating secure boot for FPGAs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The authors specify that their solution should be implemented with the PUF into a single chip (ASIC) in order to prevent an attacker from obtaining the PUF response by sniffing the SPI bus. In the same way, the approach of Pocklassery et al [132] uses the output of a PUF, implemented into a System-on-Chip (SoC), as a decryption key. This approach integrates the PUF and the rest of the security module into the same chip and is therefore not vulnerable to the previous attack.…”
Section: ) Platform Independentmentioning
confidence: 99%
“…The authors specify that their solution should be implemented with the PUF into a single chip (ASIC) in order to prevent an attacker from obtaining the PUF response by sniffing the SPI bus. In the same way, the approach of Pocklassery et al [132] uses the output of a PUF, implemented into a System-on-Chip (SoC), as a decryption key. This approach integrates the PUF and the rest of the security module into the same chip and is therefore not vulnerable to the previous attack.…”
Section: ) Platform Independentmentioning
confidence: 99%
“…DPR-based approaches (e.g., [22,23]) suggest dividing the Programmable Logic (PL) fabric into two zones, the static/security partition and the application partition. The security partition implements functions required for authentication of the device, e.g., a PUF.…”
Section: Secure Boot In Fpgasmentioning
confidence: 99%
“…DPR based approaches, such as [21] and [22], suggest dividing the Programmable Logic (PL) fabric into two zones, the static / security partition and the application partition. The security partition implements functions required for authentication of the device, e.g.…”
Section: Secure Boot In Fpgasmentioning
confidence: 99%