Secure configuration of field programmable gate arrays

29Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Although SRAM programmed Field Programmable Gate Arrays (FPGA’s) have come to dominate the industry due to their density and performance advantages over non-volatile technologies they have a serious weakness in that they are vulnerable to piracy and reverse engineering of the user design. This is becoming increasingly important as the size of chips - and hence the value of customer designs - increases. FPGA’s are now being used in consumer products where piracy is more common. Further, reconfiguration of FPGA’s in the field is becoming increasingly popular particularly in networking applications and it is vital to provide security against malicious parties interfering with equipment functionality through this mechanism.

Cite

CITATION STYLE

APA

Kean, T. (2001). Secure configuration of field programmable gate arrays. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2147, pp. 142–151). Springer Verlag. https://doi.org/10.1007/3-540-44687-7_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free