메뉴 건너뛰기




Volumn 6, Issue 4, 2010, Pages 719-728

A flexible design flow for software IP binding in FPGA

Author keywords

Design flow; field programmable gate arrays (FPGA); firmware; intellectual property; physical unclonable function; secure embedded systems; security; software binding

Indexed keywords

DESIGN FLOWS; PHYSICAL UNCLONABLE FUNCTIONS; SECURE EMBEDDED SYSTEMS; SECURITY; SOFTWARE BINDING;

EID: 78149469430     PISSN: 15513203     EISSN: None     Source Type: Journal    
DOI: 10.1109/TII.2010.2068303     Document Type: Article
Times cited : (19)

References (50)
  • 1
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • DAC'07, Jun. 4-8 [Online]. Available:
    • G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation," in Proc. 44th ACM/IEEE Design Autom. Conf., DAC'07, Jun. 4-8, 2007, pp. 9-14. [Online]. Available: https://www.trustedcomputinggroup.org/home
    • (2007) Proc. 44th ACM/IEEE Design Autom. Conf. , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 2
    • 51749089495 scopus 로고    scopus 로고
    • Brand and IP protection with physical unclonable functions
    • Syst., ISCAS'08, May 18-21
    • J. Guajardo, S. S. Kumar, G.-J. Schrijen, and P. Tuyls, "Brand and IP protection with physical unclonable functions," in Proc. IEEE Int. Symp. Circuits, Syst., ISCAS'08, May 18-21, 2008, pp. 3186-3189.
    • (2008) Proc. IEEE Int. Symp. Circuits , pp. 3186-3189
    • Guajardo, J.1    Kumar, S.S.2    Schrijen, G.-J.3    Tuyls, P.4
  • 4
    • 78149466000 scopus 로고    scopus 로고
    • D. Wheeler and R. Needham, TEA Extensions Cambridge Univ., Cambridge, U.K., Tech. Rep., 1997
    • D. Wheeler and R. Needham, TEA Extensions Cambridge Univ., Cambridge, U.K., Tech. Rep., 1997.
  • 5
    • 0021140198 scopus 로고
    • A secure one-way hash function built from des
    • Xilinx Embedded Systems Tool Reference Manual
    • R. Winternitz, "A secure one-way hash function built from DES," in Proc. IEEE Symp. Informat. Security Privacy, 1984, pp. 88-90. Xilinx Embedded Systems Tool Reference Manual.
    • (1984) Proc. IEEE Symp. Informat. Security Privacy , pp. 88-90
    • Winternitz, R.1
  • 11
    • 27544441530 scopus 로고    scopus 로고
    • Design and implementation of the AEGIS single-chip secure processor using physical random functions
    • G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas, "Design and implementation of the AEGIS single-chip secure processor using physical random functions," SIGARCH Comput. Archit. News 33, pp. 25-36, 2005.
    • (2005) SIGARCH Comput. Archit. News , vol.33 , pp. 25-36
    • Suh, G.E.1    O'Donnell, C.W.2    Sachdev, I.3    Devadas, S.4
  • 12
    • 78149464945 scopus 로고    scopus 로고
    • Volatile FPGA design security\A survey
    • [Online]. Available:
    • "Volatile FPGA design security\A survey," Saar Drimer, 2008. [Online]. Available: http://www.cl.cam.ac.uk~sd410/papers/fpga-se-curity.pdf
    • (2008) Saar Drimer
  • 13
    • 70349252061 scopus 로고    scopus 로고
    • Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity
    • Oct 27
    • M. J. Atallah, E. D. Bryant, J. T. Korb, and J. R. Rice, "Binding software to specific native hardware in a VM environment: The PUF challenge and opportunity," in Proc. 1st ACM Workshop Virtual Machine Security, Oct 27, 2008, pp. 45-48.
    • (2008) Proc. 1st ACM Workshop Virtual Machine Security , pp. 45-48
    • Atallah, M.J.1    Bryant, E.D.2    Korb, J.T.3    Rice, J.R.4
  • 14
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation\Tools for software protection
    • Aug.
    • C. S. Collberg and C. Thomborson, "Watermarking, tamper-proofing, and obfuscation\Tools for software protection," IEEE Trans. Softw. Eng., vol. 28, no. 8, pp. 735-746, Aug. 2002.
    • (2002) IEEE Trans. Softw. Eng. , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.S.1    Thomborson, C.2
  • 15
    • 84959055142 scopus 로고    scopus 로고
    • Dynamic self-checking techniques for improved tamper resistance
    • Lecture Notes in Computer Science
    • B. Horne, L. Matheson, C. Sheehan, and R. E. Tarjan, "Dynamic self-checking techniques for improved tamper resistance," Security and Privacy in Digital Rights Management, vol. 2320, Lecture Notes in Computer Science, pp. 141-159, 2002.
    • (2002) Security and Privacy in Digital Rights Management , vol.2320 , pp. 141-159
    • Horne, B.1    Matheson, L.2    Sheehan, C.3    Tarjan, R.E.4
  • 16
    • 84959058990 scopus 로고    scopus 로고
    • Protecting software code by guards
    • Lecture Notes in Computer Science
    • H. Chang and M. Atallah, "Protecting software code by guards," Security and Privacy in Digital Rights Management, vol. 2320, Lecture Notes in Computer Science, pp. 160-175, 2002.
    • (2002) Security and Privacy in Digital Rights Management , vol.2320 , pp. 160-175
    • Chang, H.1    Atallah, M.2
  • 17
    • 33645998409 scopus 로고    scopus 로고
    • Towards better software tamper resistance
    • Lecture Notes in Computer Science
    • H. Jin, G. Myles, and J. Lotspiech, "Towards better software tamper resistance," Proc. ISC 2005, vol. 3650, Lecture Notes in Computer Science, pp. 417-430, 2005.
    • (2005) Proc. ISC 2005 , vol.3650 , pp. 417-430
    • Jin, H.1    Myles, G.2    Lotspiech, J.3
  • 18
    • 61649084032 scopus 로고    scopus 로고
    • Hash function based software watermarking
    • Dec. 13-15
    • X. Zhang, F. He, and W. Zuo, "Hash function based software watermarking," in Proc. Advanced Softw. Eng. Appl., Dec. 13-15, 2008, pp. 95-98.
    • (2008) Proc. Advanced Softw. Eng. Appl. , pp. 95-98
    • Zhang, X.1    He, F.2    Zuo, W.3
  • 21
    • 77249090126 scopus 로고    scopus 로고
    • Mechanism for software tamper resistance: An application of white-box cryptography
    • Oct. 29
    • W. Michiels and P. Gorissen, "Mechanism for software tamper resistance: An application of white-box cryptography," in Proc. ACM Workshop Digital Rights Manage., Oct. 29, 2007, pp. 82-89.
    • (2007) Proc. ACM Workshop Digital Rights Manage. , pp. 82-89
    • Michiels, W.1    Gorissen, P.2
  • 22
    • 24344453452 scopus 로고    scopus 로고
    • Hardware-assisted circumvention of self-hashing software tamper resistance
    • DOI 10.1109/TDSC.2005.24
    • P. van Oorschot, A. Somayaji, and G. Wurster, "Hardware-assisted circumvention of self-hashing software tamper resistance," IEEE Trans. Dependable Secure Comput., vol. 2, no. 2, pp. 82-92, Apr.-Jun. 2005. (Pubitemid 41259858)
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.2 , pp. 82-92
    • Van Oorschot, P.C.1    Somayaji, A.2    Wurster, G.3
  • 24
    • 33748525201 scopus 로고    scopus 로고
    • The electronic part supply chain and risks of counterfeit parts in defense applications
    • Sep.
    • J. Stradley and D. Karraker, "The electronic part supply chain and risks of counterfeit parts in defense applications," IEEE Trans. Components and Packaging Technol., vol. 29, no. 3, pp. 703-705, Sep. 2006.
    • (2006) IEEE Trans. Components and Packaging Technol. , vol.29 , Issue.3 , pp. 703-705
    • Stradley, J.1    Karraker, D.2
  • 25
    • 78149465704 scopus 로고    scopus 로고
    • The International Anti-Counterfeiting Directory 2002 [Online]. Available
    • The International Anti-Counterfeiting Directory 2002, Counterfeiting Intelligence Bureau, 2005. [Online]. Available: http://www.ic-cwbo.org/ccs/cib- bureau/CIBDir.pdf
    • (2005) Counterfeiting Intelligence Bureau
  • 26
    • 78149464241 scopus 로고    scopus 로고
    • RF Café\Gray Market (Counterfeit Components) [Online] Available:
    • RF Café\Gray Market (Counterfeit Components), 2006. [Online]. Available: www.rfcafe.com/references/gray-market-links.htm
    • (2006)
  • 27
    • 78149465889 scopus 로고    scopus 로고
    • Managing the risks of counterfeiting in the information technology industry
    • [Online]. Available:
    • "Managing the risks of counterfeiting in the information technology industry," White Paper, KPMG Electronics, 2005. [Online]. Available: http://www.agmaglobal.org/
    • (2005) White Paper, KPMG Electronics
  • 28
    • 33646472901 scopus 로고    scopus 로고
    • Bogus: Electronic manufacturing and consumers confront a rising tide of counterfeit electronics
    • May
    • M. Pecht and S. Tiku, "Bogus: Electronic manufacturing and consumers confront a rising tide of counterfeit electronics," IEEE Spectrum, vol. 43, no. 5, pp. 37-46, May 2006.
    • (2006) IEEE Spectrum , vol.43 , Issue.5 , pp. 37-46
    • Pecht, M.1    Tiku, S.2
  • 32
    • 70349273538 scopus 로고    scopus 로고
    • Attack of the clones: Building clone-resistant products
    • B. Jun, "Attack of the clones: Building clone-resistant products," in Presentation in Proceedings of RSA Conf., 2006.
    • (2006) Presentation in Proceedings of RSA Conf.
    • Jun, B.1
  • 34
    • 0030672130 scopus 로고    scopus 로고
    • A secure and reliable bootstrap architecture
    • Privacy, May 4-7
    • W. A. Arbaugh, D. J. Farber, and J. M. Smith, "A secure and reliable bootstrap architecture," in Proc. IEEE Symp. Security, Privacy, May 4-7, 1997, pp. 65-71.
    • (1997) Proc. IEEE Symp. Security , pp. 65-71
    • Arbaugh, W.A.1    Farber, D.J.2    Smith, J.M.3
  • 35
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • Aug.
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proc. 13th Usenix Security Symp., Aug. 2004, pp. 16-16.
    • (2004) Proc. 13th Usenix Security Symp. , pp. 16-16
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 36
    • 50249131957 scopus 로고    scopus 로고
    • Secure firmware updates over the air in intelligent vehicles
    • ICC'08, May 19-23
    • D. K. Nilsson and U. E. Larson, "Secure firmware updates over the air in intelligent vehicles," in Proc. IEEE Int. Conf. Commun. Workshops, ICC'08, May 19-23, 2008, pp. 380-384.
    • (2008) Proc. IEEE Int. Conf. Commun. Workshops , pp. 380-384
    • Nilsson, D.K.1    Larson, U.E.2
  • 41
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-hashing for message authentication," in Internet RFC 2104. 1997.
    • (1997) Internet RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 43
    • 70449794558 scopus 로고    scopus 로고
    • Improving the quality of a physical unclonable function using configurable ring oscillators
    • FPL'09 Aug. 2
    • A. Maiti and P. Schaumont, "Improving the quality of a physical unclonable function using configurable ring oscillators," in Proc. Int. Conf. Field Programmable Logic Appl., FPL'09, Aug. 2, 2009, pp. 703-707.
    • (2009) Proc. Int. Conf. Field Programmable Logic Appl. , pp. 703-707
    • Maiti, A.1    Schaumont, P.2
  • 44
  • 50
    • 70350599741 scopus 로고    scopus 로고
    • The state-of-the-art in IC reverse engineering
    • Lecture Notes in Computer Science
    • R. Torrance, "The state-of-the-art in IC reverse engineering," in Proc. Cryptographic Hardware and Embedded Systems (CHES 2009), vol. 5747, Lecture Notes in Computer Science, pp. 363-381.
    • (2009) Proc. Cryptographic Hardware and Embedded Systems (CHES , vol.5747 , pp. 363-381
    • Torrance, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.