Ziener, 2017 - Google Patents
Improving Reliability, Security, and Efficiency of Reconfigurable Hardware Systems (Habilitation)Ziener, 2017
View PDF- Document ID
- 7621564084809900658
- Author
- Ziener D
- Publication year
External Links
Snippet
In this treatise, my research on methods to improve efficiency, reliability, and security of reconfigurable hardware systems, ie, FPGAs, through partial dynamic reconfiguration is outlined. The efficiency of reconfigurable systems can be improved by loading optimized …
- 239000004744 fabric 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5045—Circuit design
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Krautter et al. | Mitigating electrical-level attacks towards secure multi-tenant FPGAs in the cloud | |
Zhang et al. | Recent attacks and defenses on FPGA-based systems | |
US20110145934A1 (en) | Autonomous distributed programmable logic for monitoring and securing electronic systems | |
US12118282B2 (en) | Removal of hardware intellectual property and programmable replacement | |
Almeida et al. | Ransomware attack as hardware trojan: A feasibility and demonstration study | |
Elnaggar et al. | Learning malicious circuits in FPGA bitstreams | |
Olney et al. | Tunable FPGA bitstream obfuscation with boolean satisfiability attack countermeasure | |
Koblah et al. | A survey and perspective on artificial intelligence for security-aware electronic design automation | |
Jyothi et al. | Hardware Trojan attacks in FPGA and protection approaches | |
Zhang et al. | Securing FPGA-based obsolete component replacement for legacy systems | |
Plusquellic et al. | Information leakage analysis using a co-design-based fault injection technique on a risc-v microprocessor | |
Halder et al. | Obnocs: Protecting network-on-chip fabrics against reverse-engineering attacks | |
Keshavarz et al. | Survey on applications of formal methods in reverse engineering and intellectual property protection | |
Masserova et al. | Logic locking-connecting theory and practice | |
Meade et al. | IP protection through gate-level netlist security enhancement | |
Ziener | Improving Reliability, Security, and Efficiency of Reconfigurable Hardware Systems | |
Mohd et al. | Run-time monitoring and validation using reverse function (RMVRF) for hardware trojans detection | |
Saravanan et al. | Design of logically obfuscated n-bit ALU for enhanced security | |
Ziener | Improving Reliability, Security, and Efficiency of Reconfigurable Hardware Systems (Habilitation) | |
US20230006674A1 (en) | Programmable application-specific array for protecting confidentiality and integrity of hardware ips | |
Sunkavilli et al. | Dpredo: Dynamic partial reconfiguration enabled design obfuscation for fpga security | |
Sunkavilli et al. | Security threats and countermeasure deployment using partial reconfiguration in fpga cad tools | |
Collins | Hardware trojans in FPGA device IP: solutions through evolutionary computation | |
Stojilović et al. | A Visionary Look at the Security of Reconfigurable Cloud Computing | |
Mahmoud et al. | X-Attack 2.0: The Risk of Power Wasters and Satisfiability Don’t-Care Hardware Trojans to Shared Cloud FPGAs |