-
1
-
-
70449998229
-
-
US DoD Report, High performance microchip supply, US Department of Defense, http://www.acq.osd.mil/dsb/reports/2005-02-HPMS-Report- Final.pdf, 2005.
-
US DoD Report, "High performance microchip supply", US Department of Defense, http://www.acq.osd.mil/dsb/reports/2005-02-HPMS-Report- Final.pdf, 2005.
-
-
-
-
3
-
-
85084095841
-
Designing and implementing malicious hardware
-
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou, "Designing and implementing malicious hardware", in Proc. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
(2008)
Proc. First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
King, S.T.1
Tucek, J.2
Cozzie, A.3
Grier, C.4
Jiang, W.5
Zhou, Y.6
-
4
-
-
51849150133
-
FPGA-based single chip cryptographic solution
-
M. McLean, J. Moore, "FPGA-based single chip cryptographic solution", In Military Embedded Systems, http://www.mil-embedded.com/pdfs/ NSA.Mar07.pdf
-
Military Embedded Systems
-
-
McLean, M.1
Moore, J.2
-
5
-
-
85086418228
-
SeReCon: A Secure Reconfiguration Controller for self-reconfigurable systems
-
To appear in
-
K. Kepa, F. Morgan, K. Kosciuszkiewicz, T. Surmacz, "SeReCon: A Secure Reconfiguration Controller for self-reconfigurable systems", To appear in Special issue of International Journal of Critical Computer-Based Systems (IJCCBS) devoted to DepCoS-2008 conference, 2009.
-
(2009)
Special issue of International Journal of Critical Computer-Based Systems (IJCCBS) devoted to DepCoS-2008 conference
-
-
Kepa, K.1
Morgan, F.2
Kosciuszkiewicz, K.3
Surmacz, T.4
-
6
-
-
84976781807
-
-
K. Thompson, Reflections on trusting trust, Commun. ACM, 1984.
-
K. Thompson, "Reflections on trusting trust", Commun. ACM, 1984.
-
-
-
-
7
-
-
70450100772
-
-
J. Note, E. Rannaud, From the bitstream to the netlist, In Proc. of the 16th international ACM/SIGDA symposium on FPGA, ACM, 2008, pp. 264-264.
-
J. Note, E. Rannaud, "From the bitstream to the netlist", In Proc. of the 16th international ACM/SIGDA symposium on FPGA, ACM, 2008, pp. 264-264.
-
-
-
-
9
-
-
70449996172
-
-
M. Miller, Synplicity introduces secure IP flow for FPGAs, signs ARM, Tensilica as partners , http://www.edn.com/index.asp?layout= article&articleid=CA6551580 Xilinx encryption, 2008.
-
M. Miller, "Synplicity introduces secure IP flow for FPGAs, signs ARM, Tensilica as partners ", http://www.edn.com/index.asp?layout= article&articleid=CA6551580 Xilinx encryption, 2008.
-
-
-
-
10
-
-
34547295783
-
IP Security in FPGAs
-
unpublished
-
A. Lesea, "IP Security in FPGAs", unpublished, www.xilinx.com, 2007.
-
(2007)
-
-
Lesea, A.1
-
11
-
-
47349108441
-
Dynamic intellectual proper ty protection for Reconfigurable Devices
-
IEEE Computer Society
-
T. Guneysu, B. Moller, C. Paar, "Dynamic intellectual proper ty protection for Reconfigurable Devices", In Proc. of the 15th Annual IEEE Symposium on FPT, IEEE Computer Society, 2007, pp. 287-288.
-
(2007)
Proc. of the 15th Annual IEEE Symposium on FPT
, pp. 287-288
-
-
Guneysu, T.1
Moller, B.2
Paar, C.3
-
12
-
-
49749102763
-
-
B. Glas, A. Klimm, O. S., K. M., and J. Becker, A System Architecture for Reconfigurable Trusted Platforms, In Proc. of DATE, 2008.
-
B. Glas, A. Klimm, O. S., K. M., and J. Becker, "A System Architecture for Reconfigurable Trusted Platforms", In Proc. of DATE, 2008.
-
-
-
-
13
-
-
67149085947
-
A Protocol for Secure Remote Updates of FPGA Configurations
-
Proc. of the 5th Int Workshop on Applied reconfigurable Computing, Springer Verlag
-
S. Drimer, M. Kuhn, "A Protocol for Secure Remote Updates of FPGA Configurations", In Proc. of the 5th Int Workshop on Applied reconfigurable Computing, LNCS, Springer Verlag, 2009.
-
(2009)
LNCS
-
-
Drimer, S.1
Kuhn, M.2
-
14
-
-
67149093186
-
FPGA Analysis Tool: High-Level Flows for Low-Level Design Analysis in Reconfigurable Computing
-
Springer
-
K. Kepa, F. Morgan, K. Kosciuszkiewicz, L. Braun, M. Hübner, J. Becker, "FPGA Analysis Tool: High-Level Flows for Low-Level Design Analysis in Reconfigurable Computing", LNCS 5453, Springer, 2009, pp. 62-73.
-
(2009)
LNCS
, vol.5453
, pp. 62-73
-
-
Kepa, K.1
Morgan, F.2
Kosciuszkiewicz, K.3
Braun, L.4
Hübner, M.5
Becker, J.6
-
15
-
-
34547340370
-
Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems
-
T. Huffmire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner, T. Levin, T. Nguyen, C. Irvine, "Moats and drawbridges: An isolation primitive for reconfigurable hardware based systems",in Proc. of IEEE Symposium on Security and Privacy, 2007, pp. 281-295.
-
(2007)
Proc. of IEEE Symposium on Security and Privacy
, pp. 281-295
-
-
Huffmire, T.1
Brotherton, B.2
Wang, G.3
Sherwood, T.4
Kastner, R.5
Levin, T.6
Nguyen, T.7
Irvine, C.8
-
18
-
-
34548719905
-
Trojan Detection using IC Fingerprinting
-
IEEE Computer Society
-
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi and B. Sunar, "Trojan Detection using IC Fingerprinting", In Proc. of SP '07: IEEE Symposium on Security and Privacy, IEEE Computer Society, 2007, pp.296-310.
-
(2007)
Proc. of SP '07: IEEE Symposium on Security and Privacy
, pp. 296-310
-
-
Agrawal, D.1
Baktir, S.2
Karakoyunlu, D.3
Rohatgi, P.4
Sunar, B.5
-
20
-
-
34548062604
-
Authentication of FPGA bitstreams: Why and how
-
Proc. Third International Workshop, ARC, Springer, Mar
-
S. Drimer, "Authentication of FPGA bitstreams: Why and how", In Proc. Third International Workshop, (ARC), LNCS 4419, Springer, Mar. 2007, pp. 73-84.
-
(2007)
LNCS
, vol.4419
, pp. 73-84
-
-
Drimer, S.1
|