Abstract
The class of reconfigurable systems, which include the digital field programmable gate array (FPGA) and emerging new technologies such as neuromorphic computation and memristive devices, represent a type of frontier for cyber security. In this chapter, we provide a brief sketch of the field of reconfigurable systems, introduce a few basic ideas about cyber security, and consider the implications of cyber security as it applies to present and future devices. We also attempt to provide some insights on how to add robustness to reconfigurable systems technologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Victor Murray,,Daniel Llamocca, James Lyke, Keith Avery,Yuebing Jiang, Marios Pattichis.“Cell-based Architecture for Adaptive Wiring Panels: A First Prototype”, accepted, Journal of Aerospace Information Systems, Vol 10, No. 4, April 2013.
Sipser, Michael. Introduction to the Theory of Computation. Cengage Learning; third edition, 2012.
Hartenstein, Reiner W. and Herbert Brunbacher (editors), Proceedings of Field Programmable Logic and Applications: the Roadmap to Reconfigurable Computing., Lecture Notes in computer science, vol 1896, Spring-Verlach, New York, 2000.
Haykim, Simon. Neural Networks and Learning Machines, Third Edition. Prentice Hall, 2008.
Wilson, Warren, Jim Lyke, and Paul Contino,“MEMS-based Reconfigurable Manifold”, presented at MAPLD 2001, Johns Hopkins University- Applied Physics Laboratory, September 11-13, 2001.
Warren Wilson, James Lyke and Glenn Forman, “MEMS-based Reconfigurable Manifold Update”, Proceedings of the MAPLD Conference, September 7-9, 2005, Washington, DC.
Victor Murray, Daniel Llamocca, Yuebing Jiang, James Lyke, Marios Pattichis, Stephen Achramowicz, Keith Avery, “Cell-based Architecture for Adaptive Wiring Panels: A First Approach”, Proceedings of Reinventing Space Conference (RS2011), 2-6 May 2011, Los Angeles, CA.
E. Hawkes, B. An, N. M. Benbernou, H. Tanaka, S. Kim, E. D. Demaine, D. Rus, and R. J. Wood, Programmable matter by folding, PNAS 107 (28) 12441-45 (2010).
K. Gilpin, K. Ara, R. Daniela, Robot Pebbles: One Centimeter Modules for Programmable Matter through Self-Disassembly, IEEE International Conference on Robotics and Automation (ICRA), 2485-92, (2010), Eds. M Rakotondrabe and I. A. Ivan.
B. J. MacLennan, Universally programmable intelligent matter summary, Proceedings of the 2002 2nd IEEE Conference on Nanotechnology, 405—08 (2002).
D. Kushner, The Real Story of Stuxnet, IEEE Spectrum 50 (3) 48-53 (2013).
C. Schuett and J. Butts, An evaluation of modification attacks on programmable logic controllers, Int. J. Crit. Infrastructure Protection, 7 (1), 61-8 (2014).
N. Idika and B. Bhargava, Extending Attack Graph-Based Securith Metris and Aggregating Their Application, IEEE Trans. Dependable and Secure Computing 9 (1), 75-85 (2012)
C. Phillips and L.P. Swiler, A Graph-Based System for Network-Vulnerability Analysis, NSPW’98: Proc. Workshop New Security Paradigms. pp. 71-79, 1998.
Byres, Eric; Ginter, Andrew; and Joel Langill, “How Stuxnet Spreads – A Study of Infection Paths in Best Practice Systems”, white paper, Tofino Security (http://ScadaHacker.com), February 22, 2011.
Sergei Skorobogatov, Christopher Woods. “Breakthrough Silicon Scanning Discovers Backdoor in Military Chip”, Springer-Verlag, Cryptographic Hardware and Embedded Systems – CHES 2012,Lecture Notes in Computer Science Volume 7428,Proceedings of the 14th International Workshop, Leuven, Belgium, September 9-12, 2012 pp 23-40.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lyke, J., Edwards, A. (2014). Cyber Security Considerations for Reconfigurable Systems. In: Pino, R., Kott, A., Shevenell, M. (eds) Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-319-10374-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-10374-7_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10373-0
Online ISBN: 978-3-319-10374-7
eBook Packages: Computer ScienceComputer Science (R0)