Heterogeneous CPU-FPGA systems have been shown to achieve significant performance gains in domain-specific computing. However, contrary to the huge efforts invested on the performance acceleration, the community has not yet investigated the security consequences due to incorporating FPGA into the traditional CPU-based architecture. In fact, the interplay between CPU and FPGA in such a heterogeneous system may introduce brand new attack surfaces if not well controlled. We develop a hardware isolation-based secure architecture, namely HISA, to mitigate the identified new threats. HISA extends the CPU-based trusted execution environment (TEE) to the heterogeneous FPGA components to enhance the security of the CPU-FPGA system. To securely offlo...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Fie...
One of the great advances in computation over the last 20 years is the availability, connectivity, a...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Presented online on November 13, 2020 at 12:00 p.m.Jakub Szefer is an Associate Professor of Electri...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
International audienceEmbedded systems are parts of our daily life and used in many fields. They can...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
The last 30 years have seen an increase in the complexity of embedded systems from a collection of s...
Given the need for efficient high-performance computing, computer architectures combining CPUs, GPUs...
In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cor...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Fie...
One of the great advances in computation over the last 20 years is the availability, connectivity, a...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Presented online on November 13, 2020 at 12:00 p.m.Jakub Szefer is an Associate Professor of Electri...
Trusted Execution Environments (TEEs) drastically reduce the trusted computing base (TCB) of the sys...
International audienceEmbedded systems are parts of our daily life and used in many fields. They can...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
The last 30 years have seen an increase in the complexity of embedded systems from a collection of s...
Given the need for efficient high-performance computing, computer architectures combining CPUs, GPUs...
In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cor...
While hardware resources in the form of both transistors and full microprocessor cores are now abund...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Fie...