Security FPGA Analysis - Archive ouverte HAL Access content directly
Book Sections Year : 2011

Security FPGA Analysis

(1, 2, 3, 4) , (2, 3, 4) , (2, 3, 5, 4) , (2) , (2) , (2, 3, 4, 6, 7) , (8) , (2, 3, 4) , (2, 3, 5, 4) , (8) , (8) , (8)
1
2
3
4
5
6
7
8

Abstract

Security is becoming since several years a major issue in the domain of embedded systems. Fine grain reconfigurable architectures like FPGAs are providing many interesting features to be selected as an efficient target for embedded systems when security is an important concern. In this chapter we propose an overview of some existing attacks, a classification of attackers and the different levels of security as promoted by the FIPS 140-2 standard. We identify the main vulnerabilities of FPGAs to tackle the security requirements based on the security pyramid concept. We propose a presentation of some existing countermeasures at the different levels of the security pyramid to guarantee a defense-in-depth approach.
Fichier principal
Vignette du fichier
wanderley2011.pdf (1.08 Mo) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

lirmm-00809327 , version 1 (18-03-2022)

Identifiers

Cite

Eduardo Wanderley, Romain Vaslin, Jérémie Crenne, Pascal Cotret, Jean-Philippe Diguet, et al.. Security FPGA Analysis. Security Trends for FPGAS
From Secured to Secure Reconfigurable Systems
, pp.7-46, 2011, ⟨10.1007/978-94-007-1338-3_2⟩. ⟨lirmm-00809327⟩
295 View
31 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More