Security Trends for FPGAS

Security Trends for FPGAS PDF

Author: Benoit Badrignans

Publisher: Springer Science & Business Media

Published: 2011-06-20

Total Pages: 206

ISBN-13: 940071338X

DOWNLOAD EBOOK →

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Security of FPGA-Accelerated Cloud Computing Environments

Security of FPGA-Accelerated Cloud Computing Environments PDF

Author: Jakub Szefer

Publisher: Springer Nature

Published: 2024-01-29

Total Pages: 329

ISBN-13: 3031453956

DOWNLOAD EBOOK →

This book addresses security of FPGA-accelerated cloud computing environments. It presents a comprehensive review of the state-of-the-art in security threats as well as defenses. The book further presents design principles to help in the evaluation and designs of cloud-based FPGA deployments which are secure from information leaks and potential attacks.

Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms

Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms PDF

Author: Krishnendu Guha

Publisher: Springer Nature

Published: 2021-08-23

Total Pages: 195

ISBN-13: 3030797015

DOWNLOAD EBOOK →

This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. The emergence of Industry 4.0 has witnessed the deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in diverse embedded applications. These are associated with the execution of several real-time tasks arranged in schedules. However, they are associated with several issues. Development of fully and partially reconfigurable task schedules are discussed that eradicates the existing problems. However, such real-time task schedules may be jeopardized due to hardware threats. Analysis of such threats is discussed and self-aware security techniques are proposed that can detect and mitigate such threats at runtime.

Side-channel Attacks on FPGAs and Related Countermeasures

Side-channel Attacks on FPGAs and Related Countermeasures PDF

Author: Robert Patrick McEvoy

Publisher:

Published: 2008

Total Pages: 196

ISBN-13:

DOWNLOAD EBOOK →

Cryptography plays a vital role in digital communications, working to ensure the privacy and integrity of the users and their data. However, in the last decade, attacks have emerged that target physical implementations of cryptographic algorithms. In particular, side-channel attacks are of concern. It is the task of the hardware engineer to ensure that implementations of these algorithms do not introduce weaknesses in the form of side-channel information, that could compromise the integrity of the cryptosystem. This thesis investigates side-channel attacks on FPGA implementations of cryptographic algorithms. The vulnerability of cryptographic hash functions to side-channel attacks is not usually considered in the literature. However, in protocols such as HMAC, hash functions are used to process secret key information, which can be recovered via a side-channel attack. Here, using a commercial FPGA, the vulnerability of the SHA-2 and Whirlpool hash functions to Differential Power Analysis (DPA) is proven. In response to such vulnerability, masking is a common DPA countermeasure used in academia and industry. New masking schemes are presented for both hash functions, and a novel method of converting from Boolean to arithmetic masks is developed. Secure logic styles ensure that the cryptographic device consumes a constant amount of power in each clock cycle, and represent a general countermeasure to side-channel attacks. The Double Wave Dynamic Differential Logic (DWDDL) secure logic style for FPGAs is examined, and leveraged to develop an alternative logic style, Isolated WDDL (IWDDL). Using laboratory experiments, a flaw in the DWDDL design flow is highlighted, and rectified. Another general side-channel attack countermeasure is proposed in the form of All-or-Nothing Transforms (AONTs). In this thesis, it is shown that All-or-Nothing Encryption and Decryption are inherently resistant to DPA attacks. This resistance is then further increased using a novel extension to the AONE protocol. Various AONT constructions are considered, and the performance of these schemes is analysed. The thesis concludes with a comparison of general side-channel attack countermeasures, to determine the most effective method of protecting cryptosystems against side-channel at-tacks. It is shown that a ryptosystem using the All-or-Nothing countermeasure can match the performance of (and, in certain cases, outperform) an unprotected implementation.

FPGA-based Implementation of Signal Processing Systems

FPGA-based Implementation of Signal Processing Systems PDF

Author: Roger Woods

Publisher: John Wiley & Sons

Published: 2008-10-13

Total Pages: 389

ISBN-13: 0470713771

DOWNLOAD EBOOK →

Field programmable gate arrays (FPGAs) are an increasingly popular technology for implementing digital signal processing (DSP) systems. By allowing designers to create circuit architectures developed for the specific applications, high levels of performance can be achieved for many DSP applications providing considerable improvements over conventional microprocessor and dedicated DSP processor solutions. The book addresses the key issue in this process specifically, the methods and tools needed for the design, optimization and implementation of DSP systems in programmable FPGA hardware. It presents a review of the leading-edge techniques in this field, analyzing advanced DSP-based design flows for both signal flow graph- (SFG-) based and dataflow-based implementation, system on chip (SoC) aspects, and future trends and challenges for FPGAs. The automation of the techniques for component architectural synthesis, computational models, and the reduction of energy consumption to help improve FPGA performance, are given in detail. Written from a system level design perspective and with a DSP focus, the authors present many practical application examples of complex DSP implementation, involving: high-performance computing e.g. matrix operations such as matrix multiplication; high-speed filtering including finite impulse response (FIR) filters and wave digital filters (WDFs); adaptive filtering e.g. recursive least squares (RLS) filtering; transforms such as the fast Fourier transform (FFT). FPGA-based Implementation of Signal Processing Systems is an important reference for practising engineers and researchers working on the design and development of DSP systems for radio, telecommunication, information, audio-visual and security applications. Senior level electrical and computer engineering graduates taking courses in signal processing or digital signal processing shall also find this volume of interest.

FPGA-based Implementation of Signal Processing Systems

FPGA-based Implementation of Signal Processing Systems PDF

Author: Roger Woods

Publisher: Wiley-Blackwell

Published: 2008-11-24

Total Pages: 400

ISBN-13:

DOWNLOAD EBOOK →

The automation of the techniques for component architectural synthesis, computational models, and the reduction of energy consumption to help improve FPGA performance, are given in detail." "FPGA-based Implementation of Signal Processing Systems is an important reference for practising engineers and researchers working on the design and development of DSP systems for radio, telecommunication, information, audio-visual and security applications. Senior level electrical and computer engineering graduates taking courses in signal processing or digital signal processing shall also find this volume of interest."--BOOK JACKET.

Fundamentals of IP and SoC Security

Fundamentals of IP and SoC Security PDF

Author: Swarup Bhunia

Publisher: Springer

Published: 2017-01-24

Total Pages: 316

ISBN-13: 3319500570

DOWNLOAD EBOOK →

This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs and conflicts involving security, functionality, and debug requirements. Coverage also includes case studies from the “trenches” of current industrial practice in design, implementation, and validation of security-critical embedded systems. Provides an authoritative reference and summary of the current state-of-the-art in security for embedded systems, hardware IPs and SoC designs; Takes a "cross-cutting" view of security that interacts with different design and validation components such as architecture, implementation, verification, and debug, each enforcing unique trade-offs; Includes high-level overview, detailed analysis on implementation, and relevant case studies on design/verification/debug issues related to IP/SoC security.

Emerging Trends in Expert Applications and Security

Emerging Trends in Expert Applications and Security PDF

Author: Vijay Singh Rathore

Publisher: Springer Nature

Published: 2023-06-29

Total Pages: 511

ISBN-13: 9819919460

DOWNLOAD EBOOK →

The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compile the selected research papers presented at ICE-TEAS 2023 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during February 17–19, 2023. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues.