FPGA Design Security Solution Using MAX II Devices
ثبت نشده
چکیده
This document provides a solution to prevent the FPGA designs from being copied. It allows the FPGA design to remain secure even if the configuration bitstream is captured. This is accomplished by disabling the functionality of the user design within the FPGA until handshaking tokens are passed to the FPGA from the MAX ® II device. The MAX II devices are selected for generating the handshaking tokens because they are non-volatile and retain their configuration data during power down. In addition, MAX II devices are the most cost-effective CPLDs for such applications. A reference design implementing this solution is also available.
منابع مشابه
Secure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملInteroperability of Reconfiguring System on FPGA Using a Design Entry of Hardware Description Language
For a long ago, world of digital design has spread out in the many major and a lot of logics, approaches, and theories has been proposed. The digital emerges as a solution of a daily-life need and applicable on such technology from the developing devices until software-based. All of the designs has a significant point on the spesification, integration, and optimization. The designers have been ...
متن کاملDesign of Network Security Devices with Hardware Compilation and FPGA Development System --- Extended Abstract
Embedded network security devices are on the increase as purely software approaches cannot cope with existing packet throughputs, let alone high-performance LANs such as Gb Ethernet. For example, Sourcefire Inc., well known for Snort --a rule-based software search engine, have turned to an intrusion detection system (IDS) using up to ten G5 PowerPC processors aimed at fibre-optic line-rates of ...
متن کاملSelf authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملSecurity Analysis of the Bitstream Encryption Scheme of Altera FPGAs
Altera provides custom logic solutions and is, besides Xilinx, one of the biggest vendors in their sector. Altera’s Field Programmable Gate Arrays (FPGAs) are SRAM-based devices and thus volatile, which implies that they load their configuration from a configuration device or a flash memory at each new power-up. The FPGA designs are given in the form of a bitstream. In order to protect such a c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004