TY - BOOK ID - 7765908 TI - Security trends for FPGAS : from secured to secure reconfigurable systems PY - 2011 SN - 9400794665 9400713371 940071338X PB - Dordrecht : Springer, DB - UniCat KW - Computer graphics -- Data processing. KW - Field programmable gate arrays -- Security measures. KW - Local area networks (Computer networks) -- Data processing. KW - Signal processing -- Digital techniques -- Data processing. KW - Field programmable gate arrays KW - Electrical & Computer Engineering KW - Engineering & Applied Sciences KW - Electrical Engineering KW - Security measures KW - Computer networks KW - Security measures. KW - Computer network security KW - Network security, Computer KW - Security of computer networks KW - Engineering. KW - Special purpose computers. KW - Computer security. KW - Electronic circuits. KW - Circuits and Systems. KW - Special Purpose and Application-Based Systems. KW - Systems and Data Security. KW - Computer security KW - Systems engineering. KW - Software engineering. KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Computer software engineering KW - Engineering KW - Engineering systems KW - System engineering KW - Industrial engineering KW - System analysis KW - Protection KW - Design and construction KW - Special purpose computers KW - Electron-tube circuits KW - Electric circuits KW - Electron tubes KW - Electronics UR - https://www.unicat.be/uniCat?func=search&query=sysid:7765908 AB - This book is designed for all those who would like to upgrade their knowledge in the field of security and digital platforms including reconfigurable FPGAs. It is the result of a national project (ICTER) funded by the French National Research Agency (ANR) and involving four research centers (Montpellier, Paris, Lorient, Saint-Etienne) and a private company. This book details several solutions for secure application execution and application update. It presents an analysis of current threats against embedded systems and especially FPGAs. The discussion includes requirements to build a secure system, according to the FIPS standard. New secure schemes are proposed to ensure data confidentiality, integrity and authentication. These new schemes fit the tight requirements of embedded systems (performance, memory footprint, logic area and energy consumption). The cost of different architectures for performance, memory, and energy are estimated. Innovative solutions for remote reconfigurations are also detailed, taking into account security when downloading a new bitstream. Since the replay of an old bitstream in the field is a major threat for embedded systems, this issue is discussed and an original solution proposed. Proposes solutions at the logical, architecture and system levels in order to provide a global solution Clearly defines the security boundaries for a system Describes different hierarchical levels of a design, from application to technological levels. ER -