The Community for Technology Leaders
RSS Icon
Issue No.06 - November-December (2008 vol.25)
pp: 590-598
Brett Brotherton , Special Technologies Laboratory
Timothy Sherwood , University of California, Santa Barbara
Ted Huffmire , Naval Postgraduate School
Timothy Levin , Naval Postgraduate School
Thuy D. Nguyen , Naval Postgraduate School
Cynthia Irvine , Naval Postgraduate School
FPGAs combine the programmability of processors with the performance of custom hardware, and they are becoming more common in critical embedded systems. This raises interesting security implications, and new techniques are needed to manage security in FPGA designs. This article provides background on FPGA security problems and current research on reconfigurable devices and security. The authors also discuss their work to develop a set of security primitives and a component architecture for building highly secure systems on FPGAs.
embedded systems, FPGA, managing security, reconfigurable systems, security primitives, component architecture, highly secure system
Brett Brotherton, Timothy Sherwood, Ted Huffmire, Timothy Levin, Thuy D. Nguyen, Cynthia Irvine, "Managing Security in FPGA-Based Embedded Systems", IEEE Design & Test of Computers, vol.25, no. 6, pp. 590-598, November-December 2008, doi:10.1109/MDT.2008.166
1. K. Compton and S. Hauck, "Reconfigurable Computing: A Survey of Systems and Software," ACM Computing Surveys, vol. 34, no. 2, June 2002, pp. 171-210.
2. P. Schaumont et al., "A Quick Safari through the Reconfiguration Jungle," Proc. 38th Design Automation Conf. (DAC 01), ACM Press, 2001, pp. 172-177.
3. D. McGrath, "Gartner Dataquest Analyst Gives ASIC, FPGA Markets Clean Bill of Health," EE Times,13 June 2005, ?archiveDate=06/182005.
4. R. Milanowski and M. Maurer, "Outsourcing Poses Unique Challenges for the U.S. Military-Electronics Community," Chip Design, Aug./Sept. 2006, http://www.chipdesignmag.comdisplay.php?articleId=752&issueId=18 .
5. T. Huffmire et al., "Designing Secure Systems on Reconfigurable Hardware," ACM Trans. Design Automation of Electronic Systems (TODAES), vol. 13, no. 3, July 2008, article 44.
6. C. Irvine and T. Levin, "A Cautionary Note Regarding the Data Integrity Capacity of Certain Secure Systems," Integrity, Internal Control and Security in Information Systems, M. Gertz, E. Guldentops, and L. Strous eds. Kluwer Academic Publishers, 2002, pp. 3-25.
7. S. Trimberger, "Trusted Design in FPGAs," Proc. 44th Design Automation Conf. (DAC 07), ACM Press, 2007, pp. 5-8.
8. E.A. Anderson, C.E. Irvine, and R.R. Schell, "Subversion as a Threat in Information Warfare," J. Information Warfare, vol. 3, no. 2, June 2004, pp. 52-65.
9. T. Huffmire et al., "Policy-Driven Memory Protection for Reconfigurable Hardware," Proc. 11th European Symp. Research in Computer Security (ESORICS 06), LNCS 4189, Springer Berlin, 2006, pp. 461-478.
10. J. Anderson, Computer Security Technology Planning Study, tech. report EST-TR-73- 51, Electronic Systems Division, Air Force Systems Command, Hanscom Air Force Base, Oct. 1972.
11. T. Huffmire et al., "Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems," Proc. 2007 IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, 2007, pp. 281-285.
12. M. McLean and J. Moore, "FPGA-Based Single Chip Cryptographic Solution," Military Embedded Systems, Mar. 2007, .
13. H. Levy, Capability-Based Computer Systems, Butterworth-Heinemann, 1984.
8 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool