2,101 Hits in 3.4 sec

Hierarchical Watermarking Method for FPGA IP Protection

Tingyuan Nie, Lijian Zhou, Yansheng Li
2013 IETE Technical Review  
With the increasing intellectual property (IP) abuse in System-on-a-Chip design, watermarking technique is playing an important role for IP protection.  ...  In this paper, we combine watermarking methods at different levels to construct a hierarchical watermarking scheme for field programmable gate array (FPGA) IP protection.  ...  The project is sponsored by SRF for ROCS, SEM and Shandong Province Higher Educational Science and Technology Program (J09LG10).  ... 
doi:10.4103/0256-4602.123116 fatcat:5hgjcg6sjjgodofoa6y7b5rkpq

SASEBO-GIII: A hardware security evaluation board equipped with a 28-nm FPGA

Yohei Hori, Toshihiro Katashita, Akihiko Sasaki, Akashi Satoh
2012 The 1st IEEE Global Conference on Consumer Electronics 2012  
home information appliances, content distribution systems and dynamic partial reconfiguration (DPR) systems, and offers a convenient environment for studying security issues in such integrated systems  ...  Since an increasing number of current consumer electronic devices provide hardware-accelerated cryptographic functionality for data encryption, device authentication, and so forth, SCAs are considered  ...  ACKNOWLEDGEMENT Part of this work was supported by the "Core Research for Evolutional Science and Technology (CREST)" funded by the Japan Science and Technology Agency (JST).  ... 
doi:10.1109/gcce.2012.6379944 fatcat:sm4t2n773ngpfeaclmx74s6oja

Embedded-based Power Monitoring Security Module Design
임베디드 전력 모니터링 보안 모듈 설계

Chan-Ho Yoon, Gwang-Jun Kim, Chang-Soo Jang
2013 The Journal of the Korea institute of electronic communication sciences  
키워드 Embedded System, Smart Grid, Security Module, Cryptography 임베디드 시스템, 스마트 그리드, 보안 모듈, 암호기법 * 전남대학교 컴퓨터공학과(  ...  energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual  ...  Acknowledgement This research was financially supported by the Ministry of Education, Science Technology (MEST) and National Research Foundation of Korea(NRF) through the Human Resource Training Project for  ... 
doi:10.13067/jkiecs.2013.8.10.1485 fatcat:yskfa3zxtjbfddbhj6ggbzvye4

Smart Grid and Nuclear Power Plant Security by Integrating Cryptographic Hardware Chip

Niraj Kumar, Vishnu Mohan Mishra, Adesh Kumar
2021 Nuclear Engineering and Technology  
The cryptographic-based encryption and decryption approach can be used for a smart grid distribution system embedding with FPGA hardware.  ...  The research work is an effort to provide the solution for the industries working towards embedded hardware security for the smart grid, power plants, and nuclear applications.  ...  protocols by embedding the FPGA.  ... 
doi:10.1016/ fatcat:zd2zvrkcd5fv7i2yixbjr7jtta

A system architecture for reconfigurable trusted platforms

Benjamin Glas, Alexander Klimm, Oliver Sander, Klaus Müller-Glaser, Jürgen Becker
2008 Proceedings of the conference on Design, automation and test in Europe - DATE '08  
For improving the security of embedded systems, trusted computing is a promising technology.  ...  FPGAs, and possible benefits and drawbacks. We give a proposal to use actually available FPGA technology to build a trusted platform on reconfigurable hardware.  ...  In contrast to the market of personal computers (PCs) and consumer electronics, security issues of embedded systems in areas like automotive electronics, industrial automation or communication devices  ... 
doi:10.1145/1403375.1403505 fatcat:py3dsnngbzdtvjc6eo77lh6aqu

Sweet Dreams and Nightmares: Security in the Internet of Things [chapter]

Timo Kasper, David Oswald, Christof Paar
2014 Lecture Notes in Computer Science  
For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schemes.  ...  overall security of a system.  ...  Thus, in theory all data stored and processed by the embedded devices could be collected in big data bases and analyzed, which could be harmful for the data protection of the individual.  ... 
doi:10.1007/978-3-662-43826-8_1 fatcat:cdqybar3qjbhzntemo4swanlke

Crypto-Stego-Real-Time (CSRT) System for Secure Reversible Data Hiding

Latika Desai, Suresh Mali
2018 VLSI design (Print)  
This paper demonstrates frequency, Discrete Cosine Transform (DCT) domain Steganographic data hiding hardware solution for secret communication called Crypto-Stego-Real-Time (CSRT) System.  ...  Field Programmable Gate Array (FPGA) implementation shown in this paper is more secure, robust, and fast.  ...  Patil Institute of Technology, Pimpri, Pune, for encouragement and support.  ... 
doi:10.1155/2018/4804729 fatcat:34q3rsjb4jdqzfceuj77imi7a4

A Secure Content Delivery System Based on a Partially Reconfigurable FPGA

2008 IEICE transactions on information and systems  
With partial reconfigurability of a Xilinx Virtex-II Pro FPGA, the system provides an innovative single-chip solution for protecting digital content.  ...  We developed a content delivery system using a partially reconfigurable FPGA to securely distribute digital content on the Internet.  ...  consumer electronics.  ... 
doi:10.1093/ietisy/e91-d.5.1398 fatcat:aimzs7d7gvcrvltshk5fh54spe

Architectural support for securing application data in embedded systems

Olga Gelbart, Eugen Leontie, Bhagirath Narahari, Rahul Simha
2008 2008 IEEE International Conference on Electro/Information Technology  
The rapid growth and pervasive use of embedded systems makes it easier for an adversary to gain physical access to these devices to launch attacks and reverse engineer of the system.  ...  We present that data protection techniques and a performance analysis is provided through a simulation on a number of bechmarks.  ...  The complexity of the protected system dictates the mechanism for key establishment.  ... 
doi:10.1109/eit.2008.4554261 dblp:conf/eit/GelbartLNS08 fatcat:dvalfepaerdptn4qh72l36enie


B. Anand, C. Saravanan
2015 Journal of KONES Powertrain and Transport  
The project involved the development of a research ECU (RECU) using reconfigurable field programmable gate arrays (FPGA) based embedded control system for a four-stroke port fuel injected gasoline engine  ...  The developed Research Electronic Control Unit (RECU) could reveal gasoline engine performance in particular for research-based applications as it involves frequent programme development and control implementations  ...  Varun, Anna University, Chennai for their support and encouragement. Their help and enthusiasm for this project has greatly contributed to the initial success of the project.  ... 
doi:10.5604/12314005.1137939 fatcat:3agnhzlly5ca5efqoyviaux2oq

Time and Space Redundancy Fault Tolerance Trade-offs for FPGA Based Single and Multicore Designs

Mohamed Mahmoud IBRAHIM, Kenichi ASAMI, Mengu CHO
The system is developed on the virtex5 FPGA from Xilinx, it uses 65nm technology with a relatively moderate to high static power consumption. The system consists of two design alternatives.  ...  The first is a single core embedded processing system that applies time redundancy fault tolerance through execution repetition to perform self-check pointing through consensus.  ...  Software is a basic counterpart in developing complex system. Fault tolerant techniques are developed for software protection.  ... 
doi:10.2322/tastj.12.pj_15 fatcat:7janvisvlrg55fuaqm6r3dwkzy

Security FPGA Analysis [chapter]

E. Wanderley, R. Vaslin, J. Crenne, P. Cotret, G. Gogniat, J.-P. Diguet, J.-L. Danger, P. Maurine, V. Fischer, B. Badrignans, L. Barthe, P. Benoit (+1 others)
2011 Security Trends for FPGAS  
Fine grain reconfigurable architectures like FPGAs are providing many interesting features to be selected as an efficient target for embedded systems when security is an important concern.  ...  Security is becoming since several years a major issue in the domain of embedded systems.  ...  Fig. 2. 3 3 FPGA trusted area: model two for FPGA-based secure systems Fig. 2. 4 4 Modules of FPGA trusted area: model three for FPGA-based secure systems are needed.  ... 
doi:10.1007/978-94-007-1338-3_2 fatcat:5iqydsjq4nhbho63ccanv5csxa

Heterogeneous Real-Time Co-Emulation for Communication-Enabled Global Control of AC/DC Grid Integrated with Renewable Energy

Tong Duan, Tianshi Cheng, Venkata Dinavahi
2020 IEEE Open Journal of the Industrial Electronics Society  
Such a complex AC/DC power system not only creates challenges for system-level control and protection under different contingencies, but also makes the real-time co-emulation of EMT-based power system  ...  Content may change prior to final publication.  ... 
doi:10.1109/ojies.2020.3025927 fatcat:i2djpxlorfa6zgs36ooi7bakoy

Performance Evaluation of Network Gateway Design for NoC based System on FPGA Platform

Guruprasad S P, Chandrasekar B.S
2019 International Journal of Advanced Computer Science and Applications  
The proposed Network gateway achieves low latency and high throughput in NoC based systems for different PIR.  ...  Artix-7 FPGA.  ...  The NG operates at 319.6 MHz and consumes less total power around 0.104W on FPGA.  ... 
doi:10.14569/ijacsa.2019.0100937 fatcat:ar7gubydlbeevmkmcth5nvgzki

Configurable memory security in embedded systems

Jérémie Crenne, Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, Deepak Unnikrishnan
2013 ACM Transactions on Embedded Computing Systems  
System security is an increasingly important design criterion for many embedded systems.  ...  The benefits of our low overhead memory protection approaches are demonstrated using four applications implemented in a field-programmable gate array (FPGA) in an embedded system prototyping platform.  ...  These memory security mechanisms must consume minimal area and power and provide effective performance for embedded systems.  ... 
doi:10.1145/2442116.2442121 fatcat:nonibdp57jh57lsb7uda7ntdte
« Previous Showing results 1 — 15 out of 2,101 results