Security Trends for FPGAS [recurso electrónico] : From Secured to Secure Reconfigurable Systems / edited by Benoit Badrignans, Jean Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres.

Por: Badrignans, Benoit [editor.]Colaborador(es): Danger, Jean Luc [editor.] | Fischer, Viktor [editor.] | Gogniat, Guy [editor.] | Torres, Lionel [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoEditor: Dordrecht : Springer Netherlands, 2011Descripción: XV, 196 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789400713383Tema(s): Engineering | Software engineering | Data protection | Systems engineering | Engineering | Circuits and Systems | Special Purpose and Application-Based Systems | Systems and Data SecurityFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 621.3815 Clasificación LoC:TK7888.4Recursos en línea: Libro electrónicoTexto
Contenidos:
1. Introduction and Objectives -- 2. Security FPGA Analysis -- 3. Side Channel Attacks -- 4. Countermeasures against Physical Attacks in FPGAs -- 5. True Random Number Generators in FPGAs -- 6. Embedded Systems Security for FPGA -- 7. Conclusions.
En: Springer eBooksResumen: This book is designed for all those who would like to upgrade their knowledge in the field of security and digital platforms including reconfigurable FPGAs.  It is the result of a national project (ICTER) funded by the French National Research Agency (ANR) and involving four research centers (Montpellier, Paris, Lorient, Saint-Etienne) and a private company. This book details several solutions for secure application execution and application update.  It presents an analysis of current threats against embedded systems and especially FPGAs. The discussion includes requirements to build a secure system, according to the FIPS standard. New secure schemes are proposed to ensure data confidentiality, integrity and authentication.  These new schemes fit the tight requirements of embedded systems (performance, memory footprint, logic area and energy consumption).  The cost of different architectures for performance, memory, and energy are estimated. Innovative solutions for remote reconfigurations are also detailed, taking into account security when downloading a new bitstream.  Since the replay of an old bitstream in the field is a major threat for embedded systems, this issue is discussed and an original solution proposed. Proposes solutions at the logical, architecture and system levels in order to provide a global solution Clearly defines the security boundaries for a system Describes different hierarchical levels of a design, from application to technological levels
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos TK7888.4 (Browse shelf(Abre debajo)) 1 No para préstamo 378490-2001

1. Introduction and Objectives -- 2. Security FPGA Analysis -- 3. Side Channel Attacks -- 4. Countermeasures against Physical Attacks in FPGAs -- 5. True Random Number Generators in FPGAs -- 6. Embedded Systems Security for FPGA -- 7. Conclusions.

This book is designed for all those who would like to upgrade their knowledge in the field of security and digital platforms including reconfigurable FPGAs.  It is the result of a national project (ICTER) funded by the French National Research Agency (ANR) and involving four research centers (Montpellier, Paris, Lorient, Saint-Etienne) and a private company. This book details several solutions for secure application execution and application update.  It presents an analysis of current threats against embedded systems and especially FPGAs. The discussion includes requirements to build a secure system, according to the FIPS standard. New secure schemes are proposed to ensure data confidentiality, integrity and authentication.  These new schemes fit the tight requirements of embedded systems (performance, memory footprint, logic area and energy consumption).  The cost of different architectures for performance, memory, and energy are estimated. Innovative solutions for remote reconfigurations are also detailed, taking into account security when downloading a new bitstream.  Since the replay of an old bitstream in the field is a major threat for embedded systems, this issue is discussed and an original solution proposed. Proposes solutions at the logical, architecture and system levels in order to provide a global solution Clearly defines the security boundaries for a system Describes different hierarchical levels of a design, from application to technological levels

19

Con tecnología Koha