• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Forward-secure content distribution to reconfigurable hardware,” Reconfigurable Computing and FPGAs (2008)

by D Champagne, R Elbaz, C Gebotys, L Torres, R B Lee
Add To MetaCart

Tools

Sorted by:
Results 1 - 3 of 3

Securing Netlist-Level FPGA Design through Exploiting Process Variation and Degradation

by Jason Xin Zheng, Miodrag Potkonjak
"... The continuously widening gap between the Non-Recurring Engineering (NRE) and Recurring Engineering (RE) costs of producing Integrated Circuit (IC) products in the past few decades gives high incentives to unauthorized cloning and reverse-engineering of ICs. Existing IC Digital Rights Management (DR ..."
Abstract - Cited by 5 (5 self) - Add to MetaCart
The continuously widening gap between the Non-Recurring Engineering (NRE) and Recurring Engineering (RE) costs of producing Integrated Circuit (IC) products in the past few decades gives high incentives to unauthorized cloning and reverse-engineering of ICs. Existing IC Digital Rights Management (DRM) schemes often demands high overhead in area, power, and performance, or require non-volatile storage. Our goal is to develop a novel Intellectual Property (IP) protection technique that offers universal protection to both Application-Specific Integrated Circuits (ASIC) and Field-Programmable Gate-Arrays (FPGAs) from unauthorized manufacturing and reverse engineering. In this paper we show a proof-of-concept implementation of the basic elements of the technique, as well as a case study of applying the anti-cloning technique to a nontrivial FPGA design.
(Show Context)

Citation Context

...he related work we mainlyfocus on directly related IC DRM and FPGA security techniques. The first set of FPGA DRM techniques was created by John Lach and his coauthors [25][26][27]. Champagne et al. =-=[13]-=- discussed secure techniques for distribution of FPGA configurations. The largest impetus for IC reverse engineering, its surprising easiness and effectiveness was created by Cambridge University rese...

AFRL-RI-RS-TR-2014-105 HAS BEEN REVIEWED AND IS APPROVED FOR PUBLICATION IN ACCORDANCE WITH ASSIGNED DISTRIBUTION STATEMENT. FOR THE DIRECTOR:

by Stinfo Copy, Garrett S. Rose, Mark H. Linderman , 2014
"... Using Government drawings, specifications, or other data included in this document for any purpose other than Government procurement does not in any way obligate the U.S. Government. The fact that the Government formulated or supplied the drawings, specifications, or other data does not license the ..."
Abstract - Add to MetaCart
Using Government drawings, specifications, or other data included in this document for any purpose other than Government procurement does not in any way obligate the U.S. Government. The fact that the Government formulated or supplied the drawings, specifications, or other data does not license the holder or any other person or corporation; or convey any rights or permission to manufacture, use, or sell any patented invention that may relate to them. This report is the result of contracted fundamental research deemed exempt from public affairs security
(Show Context)

Citation Context

...iques.sFigure 2: CMOS NOR gate.sAPPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. 5 The first set of FPGA DRM techniques was created by John Lach and his coauthors [13] [14]s[15]. Champagne et al. =-=[16]-=- discussed secure techniques for distribution of FPGA configurations.sThe largest motivator for studying IC reverse engineering is its surprising easiness andseffectiveness of such attacks as reported...

Securing Software Intellectual Property on Commodity and Legacy Embedded Systems

by Michael A. Gora, Joseph G. Tront, Randolph C. Marchany, Michael A. Gora , 2010
"... by ..."
Abstract - Add to MetaCart
Abstract not found
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University