This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Managing Security in FPGA-Based Embedded Systems
November-December 2008 (vol. 25 no. 6)
pp. 590-598
Ted Huffmire, Naval Postgraduate School
Brett Brotherton, Special Technologies Laboratory
Timothy Sherwood, University of California, Santa Barbara
Ryan Kastner, University of California, San Diego
Timothy Levin, Naval Postgraduate School
Thuy D. Nguyen, Naval Postgraduate School
Cynthia Irvine, Naval Postgraduate School
FPGAs combine the programmability of processors with the performance of custom hardware, and they are becoming more common in critical embedded systems. This raises interesting security implications, and new techniques are needed to manage security in FPGA designs. This article provides background on FPGA security problems and current research on reconfigurable devices and security. The authors also discuss their work to develop a set of security primitives and a component architecture for building highly secure systems on FPGAs.

1. K. Compton and S. Hauck, "Reconfigurable Computing: A Survey of Systems and Software," ACM Computing Surveys, vol. 34, no. 2, June 2002, pp. 171-210.
2. P. Schaumont et al., "A Quick Safari through the Reconfiguration Jungle," Proc. 38th Design Automation Conf. (DAC 01), ACM Press, 2001, pp. 172-177.
3. D. McGrath, "Gartner Dataquest Analyst Gives ASIC, FPGA Markets Clean Bill of Health," EE Times,13 June 2005, http://www.eetimes.com/news/latest/archive/ ?archiveDate=06/182005.
4. R. Milanowski and M. Maurer, "Outsourcing Poses Unique Challenges for the U.S. Military-Electronics Community," Chip Design, Aug./Sept. 2006, http://www.chipdesignmag.comdisplay.php?articleId=752&issueId=18 .
5. T. Huffmire et al., "Designing Secure Systems on Reconfigurable Hardware," ACM Trans. Design Automation of Electronic Systems (TODAES), vol. 13, no. 3, July 2008, article 44.
6. C. Irvine and T. Levin, "A Cautionary Note Regarding the Data Integrity Capacity of Certain Secure Systems," Integrity, Internal Control and Security in Information Systems, M. Gertz, E. Guldentops, and L. Strous eds. Kluwer Academic Publishers, 2002, pp. 3-25.
7. S. Trimberger, "Trusted Design in FPGAs," Proc. 44th Design Automation Conf. (DAC 07), ACM Press, 2007, pp. 5-8.
8. E.A. Anderson, C.E. Irvine, and R.R. Schell, "Subversion as a Threat in Information Warfare," J. Information Warfare, vol. 3, no. 2, June 2004, pp. 52-65.
9. T. Huffmire et al., "Policy-Driven Memory Protection for Reconfigurable Hardware," Proc. 11th European Symp. Research in Computer Security (ESORICS 06), LNCS 4189, Springer Berlin, 2006, pp. 461-478.
10. J. Anderson, Computer Security Technology Planning Study, tech. report EST-TR-73- 51, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Oct. 1972.
11. T. Huffmire et al., "Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems," Proc. 2007 IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, 2007, pp. 281-285.
12. M. McLean and J. Moore, "FPGA-Based Single Chip Cryptographic Solution," Military Embedded Systems, Mar. 2007, http://www.mil-embedded.com/articles/id?2069 .
13. H. Levy, Capability-Based Computer Systems, Butterworth-Heinemann, 1984.

Index Terms:
embedded systems, FPGA, managing security, reconfigurable systems, security primitives, component architecture, highly secure system
Citation:
Ted Huffmire, Brett Brotherton, Timothy Sherwood, Ryan Kastner, Timothy Levin, Thuy D. Nguyen, Cynthia Irvine, "Managing Security in FPGA-Based Embedded Systems," IEEE Design & Test of Computers, vol. 25, no. 6, pp. 590-598, Nov.-Dec. 2008, doi:10.1109/MDT.2008.166
Usage of this product signifies your acceptance of the Terms of Use.