مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

683
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

148
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Secure FPGA Design by Filling Unused Spaces

Pages

  47-55

Abstract

 There are di erent kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many di erent applications, its Security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major Security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to meet the place and route requirements. In this paper, we introduce an e cient method to ll this space and thus leaving no free space for inserting HTHs. Using a shift register in combination with gate-chain is the best way of lling unused space, which incurs a no increase in power consumption of the main design. Experimental results of implementing a set of IWLS benchmarks on Xilinx Virtex devices show that the proposed prevention and detection scheme imposes a no power overhead and no degradation to performance and critical path delay of the main design.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Labafniya, Mansoureh, & Saeidi, Roghayeh. (2019). Secure FPGA Design by Filling Unused Spaces. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 11(1 ), 47-55. SID. https://sid.ir/paper/241804/en

    Vancouver: Copy

    Labafniya Mansoureh, Saeidi Roghayeh. Secure FPGA Design by Filling Unused Spaces. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2019;11(1 ):47-55. Available from: https://sid.ir/paper/241804/en

    IEEE: Copy

    Mansoureh Labafniya, and Roghayeh Saeidi, “Secure FPGA Design by Filling Unused Spaces,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 11, no. 1 , pp. 47–55, 2019, [Online]. Available: https://sid.ir/paper/241804/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button