Security Trends for FPGAS

From Secured to Secure Reconfigurable Systems

  • Benoit Badrignans
  • Jean Luc Danger
  • Viktor Fischer
  • Guy Gogniat
  • Lionel Torres

Table of contents

  1. Front Matter
    Pages I-XV
  2. L. Torres
    Pages 1-6
  3. E. Wanderley, R. Vaslin, J. Crenne, P. Cotret, G. Gogniat, J.-P. Diguet et al.
    Pages 7-46
  4. V. Lomné, A. Dehaboui, P. Maurine, L. Torres, M. Robert
    Pages 47-72
  5. J.-L. Danger, S. Guilley, L. Barthe, P. Benoit
    Pages 73-100
  6. V. Fischer, F. Bernard
    Pages 101-135
  7. B. Badrignans, F. Devic, L. Torres, G. Sassatelli, P. Benoit
    Pages 137-187
  8. Benoit Badrignans, Jean-Luc Danger, Guy Gogniat, Viktor Fischer, Lionel Torres
    Pages 189-190
  9. Back Matter
    Pages 191-196

About this book

Introduction

This book is designed for all those who would like to upgrade their knowledge in the field of security and digital platforms including reconfigurable FPGAs.  It is the result of a national project (ICTER) funded by the French National Research Agency (ANR) and involving four research centers (Montpellier, Paris, Lorient, Saint-Etienne) and a private company.

This book details several solutions for secure application execution and application update.  It presents an analysis of current threats against embedded systems and especially FPGAs. The discussion includes requirements to build a secure system, according to the FIPS standard. New secure schemes are proposed to ensure data confidentiality, integrity and authentication.  These new schemes fit the tight requirements of embedded systems (performance, memory footprint, logic area and energy consumption).  The cost of different architectures for performance, memory, and energy are estimated. Innovative solutions for remote reconfigurations are also detailed, taking into account security when downloading a new bitstream.  Since the replay of an old bitstream in the field is a major threat for embedded systems, this issue is discussed and an original solution proposed.

  • Proposes solutions at the logical, architecture and system levels in order to provide a global solution
  • Clearly defines the security boundaries for a system
  • Describes different hierarchical levels of a design, from application to technological levels

Keywords

Cryptographic engineering Embedded Systems FPGAs security Reconfigurable Computing Secure Circuits

Editors and affiliations

  • Benoit Badrignans
    • 1
  • Jean Luc Danger
    • 2
  • Viktor Fischer
    • 3
  • Guy Gogniat
    • 4
  • Lionel Torres
    • 5
  1. 1.Netheos CompanyMontpellierFrance
  2. 2.Communications et ElectroniqueEcole Nationale Superieure de Telecom.ParisFrance
  3. 3.CryptographyUniversity of St. EtienneSt. EtienneFrance
  4. 4.Lab-STICC-CNRS, UMR 3192, Centre de RechercheUniversite de Bretagne Sud - UEBLorient CedexFrance
  5. 5.MicroelectronicsUniversity Monpellier 2Montpellier 2France

Bibliographic information

  • DOI https://doi.org/10.1007/978-94-007-1338-3
  • Copyright Information Springer Science+Business Media B.V. 2011
  • Publisher Name Springer, Dordrecht
  • eBook Packages Engineering
  • Print ISBN 978-94-007-1337-6
  • Online ISBN 978-94-007-1338-3
  • About this book
Industry Sectors
Pharma
Automotive
Biotechnology
Electronics
Telecommunications
Energy, Utilities & Environment
Aerospace