Skip to main content

Cyber Security Considerations for Reconfigurable Systems

  • Chapter
  • First Online:
Cybersecurity Systems for Human Cognition Augmentation

Part of the book series: Advances in Information Security ((ADIS,volume 61))

  • 1286 Accesses

Abstract

The class of reconfigurable systems, which include the digital field programmable gate array (FPGA) and emerging new technologies such as neuromorphic computation and memristive devices, represent a type of frontier for cyber security. In this chapter, we provide a brief sketch of the field of reconfigurable systems, introduce a few basic ideas about cyber security, and consider the implications of cyber security as it applies to present and future devices. We also attempt to provide some insights on how to add robustness to reconfigurable systems technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Victor Murray,,Daniel Llamocca, James Lyke, Keith Avery,Yuebing Jiang, Marios Pattichis.“Cell-based Architecture for Adaptive Wiring Panels: A First Prototype”, accepted, Journal of Aerospace Information Systems, Vol 10, No. 4, April 2013.

    Google Scholar 

  2. Sipser, Michael. Introduction to the Theory of Computation. Cengage Learning; third edition, 2012.

    Google Scholar 

  3. Hartenstein, Reiner W. and Herbert Brunbacher (editors), Proceedings of Field Programmable Logic and Applications: the Roadmap to Reconfigurable Computing., Lecture Notes in computer science, vol 1896, Spring-Verlach, New York, 2000.

    Google Scholar 

  4. Haykim, Simon. Neural Networks and Learning Machines, Third Edition. Prentice Hall, 2008.

    Google Scholar 

  5. Wilson, Warren, Jim Lyke, and Paul Contino,“MEMS-based Reconfigurable Manifold”, presented at MAPLD 2001, Johns Hopkins University- Applied Physics Laboratory, September 11-13, 2001.

    Google Scholar 

  6. Warren Wilson, James Lyke and Glenn Forman, “MEMS-based Reconfigurable Manifold Update”, Proceedings of the MAPLD Conference, September 7-9, 2005, Washington, DC.

    Google Scholar 

  7. Victor Murray, Daniel Llamocca, Yuebing Jiang, James Lyke, Marios Pattichis, Stephen Achramowicz, Keith Avery, “Cell-based Architecture for Adaptive Wiring Panels: A First Approach”, Proceedings of Reinventing Space Conference (RS2011), 2-6 May 2011, Los Angeles, CA.

    Google Scholar 

  8. E. Hawkes, B. An, N. M. Benbernou, H. Tanaka, S. Kim, E. D. Demaine, D. Rus, and R. J. Wood, Programmable matter by folding, PNAS 107 (28) 12441-45 (2010).

    Article  Google Scholar 

  9. K. Gilpin, K. Ara, R. Daniela, Robot Pebbles: One Centimeter Modules for Programmable Matter through Self-Disassembly, IEEE International Conference on Robotics and Automation (ICRA), 2485-92, (2010), Eds. M Rakotondrabe and I. A. Ivan.

    Google Scholar 

  10. B. J. MacLennan, Universally programmable intelligent matter summary, Proceedings of the 2002 2nd IEEE Conference on Nanotechnology, 405—08 (2002).

    Google Scholar 

  11. D. Kushner, The Real Story of Stuxnet, IEEE Spectrum 50 (3) 48-53 (2013).

    Article  MathSciNet  Google Scholar 

  12. C. Schuett and J. Butts, An evaluation of modification attacks on programmable logic controllers, Int. J. Crit. Infrastructure Protection, 7 (1), 61-8 (2014).

    Article  Google Scholar 

  13. N. Idika and B. Bhargava, Extending Attack Graph-Based Securith Metris and Aggregating Their Application, IEEE Trans. Dependable and Secure Computing 9 (1), 75-85 (2012)

    Article  Google Scholar 

  14. C. Phillips and L.P. Swiler, A Graph-Based System for Network-Vulnerability Analysis, NSPW’98: Proc. Workshop New Security Paradigms. pp. 71-79, 1998.

    Google Scholar 

  15. Byres, Eric; Ginter, Andrew; and Joel Langill, “How Stuxnet Spreads – A Study of Infection Paths in Best Practice Systems”, white paper, Tofino Security (http://ScadaHacker.com), February 22, 2011.

  16. Sergei Skorobogatov, Christopher Woods. “Breakthrough Silicon Scanning Discovers Backdoor in Military Chip”, Springer-Verlag, Cryptographic Hardware and Embedded Systems – CHES 2012,Lecture Notes in Computer Science Volume 7428,Proceedings of the 14th International Workshop, Leuven, Belgium, September 9-12, 2012 pp 23-40.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James Lyke .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lyke, J., Edwards, A. (2014). Cyber Security Considerations for Reconfigurable Systems. In: Pino, R., Kott, A., Shevenell, M. (eds) Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-319-10374-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10374-7_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10373-0

  • Online ISBN: 978-3-319-10374-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics