-
1
-
-
0003605208
-
-
John Wiley & Sons, Inc, New York, NY, USA
-
Anderson R. J., Security engineering: A guide to building dependable distributed systems, John Wiley & Sons, Inc., New York, NY, USA, 2001. http://www.cl.cam.ac.uk/~rjal4/book.html.
-
(2001)
Security engineering: A guide to building dependable distributed systems
-
-
Anderson, R.J.1
-
2
-
-
0003584029
-
Security requirements for cryptographic modules
-
FIPS PUB 140-3 Development, Technical report, U.S. Department of Commerce
-
FIPS PUB 140-3 Development. Security requirements for cryptographic modules. Technical report, U.S. Department of Commerce, 2007.
-
(2007)
-
-
-
3
-
-
36349012325
-
Physical configuration on-line visualization of Xilinx Virtex-II FPGAs
-
M. Huebner, L. Braun, J. Becker, C. Claus, and W. Stechele, "Physical configuration on-line visualization of Xilinx Virtex-II FPGAs". In VLSI, 2007. ISVLSI '07. IEEE Computer Society Annual Symposium on, pages 41-46, 2007.
-
(2007)
VLSI, 2007. ISVLSI '07. IEEE Computer Society Annual Symposium on
, pp. 41-46
-
-
Huebner, M.1
Braun, L.2
Becker, J.3
Claus, C.4
Stechele, W.5
-
4
-
-
34547340370
-
Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems
-
T. Huffmire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner, T. Levin, T. Nguyen, and C. Irvine, "Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems", In IEEE Symposium on Security and Privacy, pages 281-295, 2007.
-
(2007)
In IEEE Symposium on Security and Privacy
, pp. 281-295
-
-
Huffmire, T.1
Brotherton, B.2
Wang, G.3
Sherwood, T.4
Kastner, R.5
Levin, T.6
Nguyen, T.7
Irvine, C.8
-
5
-
-
34247384705
-
REPLICA2Pro: Task relocation by bitstream manipulation in Virtex-II/Pro FPGAs
-
New York, NY, USA, ACM Press
-
H. Kalte, M. Porrmann, "REPLICA2Pro: task relocation by bitstream manipulation in Virtex-II/Pro FPGAs", In CF '06: Proceedings of the 3rd conference on Computing frontiers, pages 403-412, New York, NY, USA, 2006. ACM Press.
-
(2006)
CF '06: Proceedings of the 3rd conference on Computing frontiers
, pp. 403-412
-
-
Kalte, H.1
Porrmann, M.2
-
6
-
-
51849141354
-
SeReCon: A Secure Dynamic Partial Reconfiguration Controller
-
K. Kepa, F. Morgan, K. Kosciuszkiewicz, and T. Surmacz, "SeReCon: a Secure Dynamic Partial Reconfiguration Controller", In IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures, 2008.
-
(2008)
IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures
-
-
Kepa, K.1
Morgan, F.2
Kosciuszkiewicz, K.3
Surmacz, T.4
-
7
-
-
46249103562
-
Virtex II FPGA bitstream manipulation: Application to reconfiguration control systems
-
Aug
-
Y. E. Krasteva, E. de la Torre, T. Riesgo, and Didier Joly, "Virtex II FPGA bitstream manipulation: Application to reconfiguration control systems", FPL '06. International Conference on Field Programmable Logic and Applications, pages 1-4, Aug. 2006.
-
(2006)
FPL '06. International Conference on Field Programmable Logic and Applications
, pp. 1-4
-
-
Krasteva, Y.E.1
de la Torre, E.2
Riesgo, T.3
Joly, D.4
-
9
-
-
34547295783
-
IP security in FPGAs
-
Technical report, Xilinx, 2007
-
A. Lesea, "IP security in FPGAs", Technical report, Xilinx, 2007.
-
-
-
Lesea, A.1
-
11
-
-
51849109221
-
-
J.-B. Note and E. Rannaud, From the bitstream to the netlist, Technical report, Departement d'informatique 'Ecole Normale Sup'erieure, September 2007.
-
J.-B. Note and E. Rannaud, "From the bitstream to the netlist", Technical report, Departement d'informatique 'Ecole Normale Sup'erieure, September 2007.
-
-
-
-
12
-
-
84976781807
-
Reflections on trusting trust
-
K. Thompson, "Reflections on trusting trust", Commun. ACM, 27(8):761-763, 1984.
-
(1984)
Commun. ACM
, vol.27
, Issue.8
, pp. 761-763
-
-
Thompson, K.1
-
13
-
-
33646520960
-
Virtex-II Pro and Virtex-II Pro X platform FPGAs: Complete data sheet
-
Technical report, Xilinx, 2005
-
Xilinx, "Virtex-II Pro and Virtex-II Pro X platform FPGAs: Complete data sheet", Technical report, Xilinx, 2005.
-
-
-
Xilinx1
-
14
-
-
51849088364
-
Virtex-II Pro user guide
-
Xilinx, 2005
-
Xilinx, "Virtex-II Pro user guide",Technical report, Xilinx, 2005.
-
Technical report
-
-
Xilinx1
-
16
-
-
62349136920
-
Virtex-5 Configuration User Guide
-
Technical report, Xilinx, 2007
-
Xilinx, "Virtex-5 Configuration User Guide", Technical report, Xilinx, 2007.
-
-
-
Xilinx1
-
18
-
-
37149044968
-
-
G. E. Suh, C. W. O'Donnell, S. Devadas, Aegis: A Single-Chip Secure Processor, IEEE Des. Test, IEEE Computer Society Press, 2007, 24, 570-580
-
G. E. Suh, C. W. O'Donnell, S. Devadas, "Aegis: A Single-Chip Secure Processor", IEEE Des. Test, IEEE Computer Society Press, 2007, 24, 570-580
-
-
-
-
20
-
-
51849088804
-
-
Bell D. E., LaPadula L., Secure Computer Systems, ESD-TR-73-278, Mitre Corp., v I and II (1973), v III (1974).
-
Bell D. E., LaPadula L., "Secure Computer Systems", ESD-TR-73-278, Mitre Corp., v I and II (1973), v III (1974).
-
-
-
-
21
-
-
49749102763
-
-
B. Glas, A. Klimm, O. S. K. M. & J. Becker, A System Architecture for Reconfigurable Trusted Platforms, DATE, 2008.
-
B. Glas, A. Klimm, O. S. K. M. & J. Becker, "A System Architecture for Reconfigurable Trusted Platforms", DATE, 2008.
-
-
-
-
22
-
-
50149103541
-
Dynamic Intellectual Property Protection for Reconfigurable Devices
-
Field Programmable Technology
-
T. Guneysu, B. Moller, C. Paar, "Dynamic Intellectual Property Protection for Reconfigurable Devices", Field Programmable Technology, 2007. FPT 2007. IEEE International Conference on, 2007.
-
(2007)
FPT 2007. IEEE International Conference on, 2007
-
-
Guneysu, T.1
Moller, B.2
Paar, C.3
-
23
-
-
34548062604
-
Authentication of FPGA bitstreams: Why and how
-
Springer
-
S. Drimer, "Authentication of FPGA bitstreams: Why and how" Workshop on Applied Reconfigurable Computing, Springer, 2007, 4419, 73-84.
-
(2007)
Workshop on Applied Reconfigurable Computing
, vol.4419
, pp. 73-84
-
-
Drimer, S.1
-
24
-
-
51849146775
-
-
Trusted Computing Group
-
Trusted Computing Group, http://www.trustedcomputinggroup.org/, 2003.
-
(2003)
-
-
|