메뉴 건너뛰기




Volumn , Issue , 2008, Pages 135-141

A prototype of trusted platform functionality on reconfigurable hardware for bitstream updates

Author keywords

Automotive; Embedded systems; FPGA; IP core; Partial reconfiguration; Reconfigurable hardware; TPM; Trusted computing; Update

Indexed keywords

ARSENIC COMPOUNDS; COMPUTER NETWORKS; COMPUTER PROGRAMMING LANGUAGES; FIELD PROGRAMMABLE GATE ARRAYS (FPGA); INTEGRATED CIRCUITS;

EID: 51549101299     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RSP.2008.24     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 1
    • 24644449303 scopus 로고    scopus 로고
    • Secure software delivery and installation in embedded systems
    • R. H. Deng, editor, ISPEC 2005, of, Springer
    • A. Adelsbach, U. Huber, and A.-R. Sadeghi. Secure software delivery and installation in embedded systems. In R. H. Deng, editor, ISPEC 2005, volume 3439 of LNCS, pages 255-267. Springer, 2005.
    • (2005) LNCS , vol.3439 , pp. 255-267
    • Adelsbach, A.1    Huber, U.2    Sadeghi, A.-R.3
  • 2
    • 33749349575 scopus 로고    scopus 로고
    • W. Adi, R. Ernst, B. Soudan, and A. Hanoun. Vlsi design exchange with intellectual property protection in fpga environment using both secret and public-key cryptography. Emerging VLSI Technologies and Architectures, 2006. IEEE Computer Society Annual Symposium on, 00:6 pp.-, 2-3 March 2006.
    • W. Adi, R. Ernst, B. Soudan, and A. Hanoun. Vlsi design exchange with intellectual property protection in fpga environment using both secret and public-key cryptography. Emerging VLSI Technologies and Architectures, 2006. IEEE Computer Society Annual Symposium on, 00:6 pp.-, 2-3 March 2006.
  • 3
    • 51549090918 scopus 로고    scopus 로고
    • Using the Design Security Feature in Stratix II and Stratix II GX Devices
    • Altera Corporation
    • Altera Corporation. Using the Design Security Feature in Stratix II and Stratix II GX Devices. Document AN341 (v2.1), 2007.
    • (2007) Document AN341 (v2.1)
  • 6
    • 51549092162 scopus 로고    scopus 로고
    • FIPS-180-2, Secure Hash Standard (SHS)
    • verfügbar unter
    • National Institute of Standards and Technology (NIST): FIPS-180-2, Secure Hash Standard (SHS), 2002. Elektronisch verfügbar unter http://www.itl.nist.gov/fipspubs/.
    • (2002) Elektronisch
  • 8
    • 84945300922 scopus 로고    scopus 로고
    • Comparative analysis of the hardware implementations of hash functions sha-1 and sha-512
    • T. Grembowski, R. Lien, K. Gaj, N. Nguyen, P. Bellows, J. Flidr, T. Lehman, and B. Scott. Comparative analysis of the hardware implementations of hash functions sha-1 and sha-512. LNCS, 2433:75-89, 2002.
    • (2002) LNCS , vol.2433 , pp. 75-89
    • Grembowski, T.1    Lien, R.2    Gaj, K.3    Nguyen, N.4    Bellows, P.5    Flidr, J.6    Lehman, T.7    Scott, B.8
  • 9
    • 38149048562 scopus 로고    scopus 로고
    • Security for mobile low power nodes in a personal area network by means of trusted platform modules
    • ESAS 2007
    • U. Grossmann, E. Berkhan, L. C. Jatoba, J. Ottenbacher, W. Stork, and K. D. Mueller-Glaser. Security for mobile low power nodes in a personal area network by means of trusted platform modules. LNCS, 4572:172-186, 2007. ESAS 2007.
    • (2007) LNCS , vol.4572 , pp. 172-186
    • Grossmann, U.1    Berkhan, E.2    Jatoba, L.C.3    Ottenbacher, J.4    Stork, W.5    Mueller-Glaser, K.D.6
  • 10
    • 51549086421 scopus 로고    scopus 로고
    • Herstellerinitiative Software HIS, available electronically at
    • Herstellerinitiative Software (HIS). HIS-Presentation 2004-05, 2005. available electronically at www.automotive-his.de.
    • (2005) HIS-Presentation 2004-05
  • 11
    • 77953146174 scopus 로고    scopus 로고
    • Herstellerinitiative Software HIS, available electronically at
    • Herstellerinitiative Software (HIS). HIS Security Module Specification v1.1, 2006. available electronically at www.automotive-his.de.
    • (2006) HIS Security Module Specification v1.1
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 15
    • 36348937390 scopus 로고    scopus 로고
    • Modular system concept for FPGA-based Automotive Gateway
    • VDI-Berichte, VDI, Verein Deutscher Ingenieure
    • O. Sander, J. Becker, M. Hübner, M. Dreschmann, J. Luka, M. Traub, and T. Weber. Modular system concept for FPGA-based Automotive Gateway. In Electronic Systems for Vehicles, number 2000 in VDI-Berichte, pages 223-232. VDI, Verein Deutscher Ingenieure, 2007.
    • (2007) Electronic Systems for Vehicles , Issue.2000 , pp. 223-232
    • Sander, O.1    Becker, J.2    Hübner, M.3    Dreschmann, M.4    Luka, J.5    Traub, M.6    Weber, T.7
  • 17
  • 18
    • 51549110078 scopus 로고    scopus 로고
    • Trusted Computing Group. Trusted computing platform alliance main specification version 1.1b. Available electronically at www. trustedcomputinggroup.org, 2003.
    • Trusted Computing Group. Trusted computing platform alliance main specification version 1.1b. Available electronically at www. trustedcomputinggroup.org, 2003.
  • 19
    • 51549088723 scopus 로고    scopus 로고
    • Xilinx Inc. Advanced Security Schemes for Spartan-3A/3AN/3A DSP FPGAs
    • Xilinx Inc. Advanced Security Schemes for Spartan-3A/3AN/3A DSP FPGAs. Document WP267 (v1.0), 2007.
    • (2007) Document WP267 (v1.0)
  • 20
    • 33845587917 scopus 로고    scopus 로고
    • L. Yuan, G. Qu, L. Ghout, and A. Bouridane. Vlsi design ip protection: Solutions, new challenges, and opportunities. ahs, 0:469-476, 2006.
    • L. Yuan, G. Qu, L. Ghout, and A. Bouridane. Vlsi design ip protection: Solutions, new challenges, and opportunities. ahs, 0:469-476, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.