Labafniya et al., 2019 - Google Patents
Secure FPGA Design by Filling Unused Spaces.Labafniya et al., 2019
- Document ID
- 1569678784792831831
- Author
- Labafniya M
- Saeidi R
- Publication year
- Publication venue
- ISeCure
External Links
Snippet
There are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is …
- 238000001514 detection method 0 abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/75—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3183—Generation of test inputs, e.g. test vectors, patterns or sequence
- G01R31/318385—Random or pseudo-random test pattern
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/28—Testing of electronic circuits, e.g. by signal tracer
- G01R31/317—Testing of digital circuits
- G01R31/3181—Functional testing
- G01R31/3185—Reconfiguring for testing, e.g. LSSD, partitioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nahiyan et al. | Security-aware FSM design flow for identifying and mitigating vulnerabilities to fault attacks | |
Akter et al. | A survey on hardware security: Current trends and challenges | |
Bhunia et al. | Hardware Trojan attacks: Threat analysis and countermeasures | |
Wang et al. | IIPS: Infrastructure IP for secure SoC design | |
Chakraborty et al. | A flexible online checking technique to enhance hardware trojan horse detectability by reliability analysis | |
Jin et al. | Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing | |
Tehranipoor et al. | A survey of hardware trojan taxonomy and detection | |
Islam et al. | High-level synthesis of key-obfuscated RTL IP with design lockout and camouflaging | |
Vosatka | Introduction to hardware trojans | |
Almeida et al. | Ransomware attack as hardware trojan: a feasibility and demonstration study | |
Sumathi et al. | A review on HT attacks in PLD and ASIC designs with potential defence solutions | |
Das et al. | PSC-watermark: Power side channel based IP watermarking using clock gates | |
Labafniya et al. | Secure FPGA Design by Filling Unused Spaces. | |
Kareem et al. | Physical unclonable functions based hardware obfuscation techniques: A state of the art | |
Nejat et al. | ESCALATION: Leveraging logic masking to facilitate path-delay-based hardware Trojan detection methods | |
Farahmandi et al. | CAD for hardware security | |
Dipu et al. | Agile: Automated assertion generation to detect information leakage vulnerabilities | |
Mankali et al. | Vigilant: Vulnerability detection tool against fault-injection attacks for locking techniques | |
Labafniya et al. | Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing. | |
Majzoobi et al. | FPGA-oriented Security | |
Wang | Hardware trojan attacks: Threat analysis and low-cost countermeasures through golden-free detection and secure design | |
Tehranipoor et al. | Rethinking Hardware Watermark | |
Naidu et al. | Secured Test Pattern Generators for BIST | |
Dunlap et al. | A Novel Circuit Authentication Scheme Based on Partial Polymorphic Gates | |
Xiao | Techniques for improving security and trustworthiness of integrated circuits |