메뉴 건너뛰기




Volumn , Issue , 2009, Pages 211-218

A flexible design flow for software IP binding in commodity FPGA

Author keywords

FPGA; Intellectual property; Physical uncionable functions; Security applications; Software binding

Indexed keywords

CRITICAL COMPONENT; DESIGN FLOWS; FLEXIBLE DESIGNS; FPGA; HARDWARE AND SOFTWARE; NOVEL DESIGN; PHYSICAL UNCIONABLE FUNCTIONS; PHYSICAL UNCLONABLE FUNCTIONS; PROTOTYPE IMPLEMENTATIONS; SECURITY APPLICATIONS; SOFTWARE BINDING; SOFTWARE INTELLECTUAL PROPERTIES; SYSTEM ON CHIPS;

EID: 70449451246     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SIES.2009.5196217     Document Type: Conference Paper
Times cited : (13)

References (25)
  • 1
    • 34547307341 scopus 로고    scopus 로고
    • Physical Unclonable Functions for Device Authentication and Secret Key Generation
    • June
    • G.E.Suh and S.Devadas.Physical Unclonable Functions for Device Authentication and Secret Key Generation.In Proceedings of Design Automation Conference, June 2007.
    • (2007) Proceedings of Design Automation Conference
    • Suh, G.E.1    Devadas, S.2
  • 2
    • 70449406215 scopus 로고    scopus 로고
    • https://www.trustedcomputinggroup.orgjhome
  • 4
    • 70449420849 scopus 로고    scopus 로고
    • N.Ferguson, B.Schneier.Practical Cryptography.Wiley Publishing Inc
    • N.Ferguson, B.Schneier.Practical Cryptography.Wiley Publishing Inc.
  • 5
    • 70449423616 scopus 로고    scopus 로고
    • Wheeler, D., Needham, R.: TEA extensions.Technical report, Cambridge University, England (October 1997).
    • Wheeler, D., Needham, R.: TEA extensions.Technical report, Cambridge University, England (October 1997).
  • 7
    • 70449454759 scopus 로고    scopus 로고
    • Xilinx Embedded Systems Tool Reference Manual
    • Xilinx Embedded Systems Tool Reference Manual.
  • 8
    • 70449406214 scopus 로고    scopus 로고
    • R.Anderson and M.Kuhn.Tamper Resistance-A Cautionary Note.InProceedings of 2nd USENIX Workshop on Electronic Commerce, November 1996.
    • R.Anderson and M.Kuhn.Tamper Resistance-A Cautionary Note.InProceedings of 2nd USENIX Workshop on Electronic Commerce, November 1996.
  • 9
    • 27244445173 scopus 로고    scopus 로고
    • Semi-Invasive Attacks-A New Approach to Hardware Security Analysis
    • UCAM-CL-TR-630.University of Cambridge
    • S.P.Skorobogatov.Semi-Invasive Attacks-A New Approach to Hardware Security Analysis.In Technical Report UCAM-CL-TR-630.University of Cambridge
    • In Technical Report
    • Skorobogatov, S.P.1
  • 11
    • 70449423615 scopus 로고    scopus 로고
    • Xilinx.Inc., Using bitstream encryption, Handbook of the Virtex II Platform.[Online].Available: http://www.xilinx.com
    • Xilinx.Inc., Using bitstream encryption," Handbook of the Virtex II Platform.[Online].Available: http://www.xilinx.com
  • 12
    • 70449439719 scopus 로고    scopus 로고
    • J.Guajardo, S.S.Kumar, G.-1.Schrijen and P.Tuyls, FPGA intrinsic PUFs and their use for IP protection.In Cryptographic Hardware and Embedded Systems, 2007.
    • J.Guajardo, S.S.Kumar, G.-1.Schrijen and P.Tuyls, FPGA intrinsic PUFs and their use for IP protection.In Cryptographic Hardware and Embedded Systems, 2007.
  • 15
    • 70349252061 scopus 로고    scopus 로고
    • Atallah, M.1., Bryant, E.D., Korb, 1.T., and Rice, 1.R.2008.Binding software to specific native hardware in a VM environment: the puf challenge and opportunity.In Proceedings of the 1st ACM Workshop on Virtual Machine Security (Alexandria, Virginia, USA, October 27-27, 2008).VMSec '08.ACM, New York, NY, 45-48.
    • Atallah, M.1., Bryant, E.D., Korb, 1.T., and Rice, 1.R.2008.Binding software to specific native hardware in a VM environment: the puf challenge and opportunity.In Proceedings of the 1st ACM Workshop on Virtual Machine Security (Alexandria, Virginia, USA, October 27-27, 2008).VMSec '08.ACM, New York, NY, 45-48.
  • 16
  • 17
    • 84959055142 scopus 로고    scopus 로고
    • Dynamic SelfChecking Techniques for Improved Tamper Resistance.In Security and Privacy in Digital Rights Management
    • B.Home, L.Matheson, C.Sheehan, and R.E.Tarjan, Dynamic SelfChecking Techniques for Improved Tamper Resistance.In Security and Privacy in Digital Rights Management, LNCS, 2320:141-159, 2002.
    • (2002) LNCS , vol.2320 , pp. 141-159
    • Home, B.1    Matheson, L.2    Sheehan, C.3    Tarjan, R.E.4
  • 18
    • 84959058990 scopus 로고    scopus 로고
    • Protecting software code by guards.In Security and Privacy in Digital Rights Management
    • H.Chang, M.Atallah.Protecting software code by guards.In Security and Privacy in Digital Rights Management, LNCS, 2320: 160-175, 2002.
    • (2002) LNCS , vol.2320 , pp. 160-175
    • Chang, H.1    Atallah, M.2
  • 19
    • 33645998409 scopus 로고    scopus 로고
    • G.Myles, and 1.Lotspiech, Towards Better Software Tamper Resistance
    • ISC
    • H.Jin, G.Myles, and 1.Lotspiech, Towards Better Software Tamper Resistance.In ISC 2005, LNCS 3650, pp.417--430,2005.
    • (2005) LNCS , vol.3650 , pp. 417-430
    • Jin, H.1
  • 20
    • 61649084032 scopus 로고    scopus 로고
    • Xuesong Zhang; Fengling He; Wanli Zuo, Hash Function Based Software Watermarking.In Advanced Software Engineering and Its Applications, 2008.ASEA 2008 , no., pp.95-98, 13-15 Dec.2008
    • Xuesong Zhang; Fengling He; Wanli Zuo, Hash Function Based Software Watermarking.In Advanced Software Engineering and Its Applications, 2008.ASEA 2008 , vol., no., pp.95-98, 13-15 Dec.2008
  • 21
    • 84949509764 scopus 로고    scopus 로고
    • Palsberg, J.; Krishnaswamy, S.; Minseok Kwon; Ma, D.; Qiuyun Shao; Zhang, Y., Experience with software watermarking.In Computer Security Applications, 2000.ACSAC '00.16th Annual Conference , no., pp.308-316, Dec 2000
    • Palsberg, J.; Krishnaswamy, S.; Minseok Kwon; Ma, D.; Qiuyun Shao; Zhang, Y., Experience with software watermarking.In Computer Security Applications, 2000.ACSAC '00.16th Annual Conference , vol., no., pp.308-316, Dec 2000
  • 22
    • 33745828710 scopus 로고    scopus 로고
    • Ge, J., Chaudhuri, S., and Tyagi, A.2005.Control flow based obfuscation.In Proceedings of the 5th ACM Workshop on Digital Rights Management (Alexandria, VA, USA, November 07-07, 2005).DRM '05.ACM, New York, NY, 83-92.
    • Ge, J., Chaudhuri, S., and Tyagi, A.2005.Control flow based obfuscation.In Proceedings of the 5th ACM Workshop on Digital Rights Management (Alexandria, VA, USA, November 07-07, 2005).DRM '05.ACM, New York, NY, 83-92.
  • 23
    • 77249090126 scopus 로고    scopus 로고
    • Michiels, W.and Gorissen, P.2007.Mechanism for software tamper resistance: an application of white-box cryptography.In Proceedings of the 2007 ACM Workshop on Digital Rights Management (Alexandria, Virginia, USA, October 29-29, 2007).DRM '07.ACM, New York, NY, 82-89.
    • Michiels, W.and Gorissen, P.2007.Mechanism for software tamper resistance: an application of white-box cryptography.In Proceedings of the 2007 ACM Workshop on Digital Rights Management (Alexandria, Virginia, USA, October 29-29, 2007).DRM '07.ACM, New York, NY, 82-89.
  • 24
    • 24344453452 scopus 로고    scopus 로고
    • P.Van Oorschot, A.Somayaji, G.Wurster, Hardware-assisted circumvention of self-hashing software tamper resistance, In IEEE Trans on dependable and secure computing.2(2):82-92, April-June 2005.
    • P.Van Oorschot, A.Somayaji, G.Wurster, Hardware-assisted circumvention of self-hashing software tamper resistance, In IEEE Trans on dependable and secure computing.2(2):82-92, April-June 2005.
  • 25
    • 1142280988 scopus 로고    scopus 로고
    • Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., and Devadas, S.2003.AEGIS: architecture for tamper-evident and tamper-resistant processing.In Proceedings of the 17th Annual international Conference on Supercomputing (San Francisco, CA, USA, June 23-26,2003).ICS '03.ACM, New York, NY, 160-171.
    • Suh, G.E., Clarke, D., Gassend, B., van Dijk, M., and Devadas, S.2003.AEGIS: architecture for tamper-evident and tamper-resistant processing.In Proceedings of the 17th Annual international Conference on Supercomputing (San Francisco, CA, USA, June 23-26,2003).ICS '03.ACM, New York, NY, 160-171.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.