Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurable hardware. This allows to enhance complex software systems with reconfigurable hardware accelerators. Unfortunately, even when state-of-the-art software security mechanisms are implemented, this combination creates new security threats. Attacks on the software are now possible through the reconfigurable hardware as these cores share resources with the processor and may contain unwanted functionality. In this paper, we discuss software protection mechanisms offered in conventional SoCs and how they can be circumvented by malicious hardware blocks. As a concrete example, we show how the malicious functionality within an IP core accesses and r...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...
Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA applica...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
Reconfigurable hardware including Field programmable gate arrays (FPGAs) are being used in a wide ra...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
Computing systems designed using reconfigurable hardware are now used in many sensitive applications...
. Programmable logic is widely used, for applications ranging from field-upgradable subsystems to ad...
System-on-Chips which include FPGAs are important platforms for critical applications since they pro...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceIn recent years, the need in security for embedded devices and data centers ha...
Field Programmable Gate Arrays (FPGAs) are reconfigurable devices which have emerged as an interesti...
Abstract—Nowadays, embedded systems become more and more complex: the hardware/software codesign app...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but a...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...
Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA applica...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
Reconfigurable hardware including Field programmable gate arrays (FPGAs) are being used in a wide ra...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
Computing systems designed using reconfigurable hardware are now used in many sensitive applications...
. Programmable logic is widely used, for applications ranging from field-upgradable subsystems to ad...
System-on-Chips which include FPGAs are important platforms for critical applications since they pro...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceIn recent years, the need in security for embedded devices and data centers ha...
Field Programmable Gate Arrays (FPGAs) are reconfigurable devices which have emerged as an interesti...
Abstract—Nowadays, embedded systems become more and more complex: the hardware/software codesign app...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but a...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...
Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA applica...