Advertisement

Handbook of FPGA Design Security

  • Ted Huffmire
  • Cynthia Irvine
  • Thuy D. Nguyen
  • Timothy Levin
  • Ryan Kastner
  • Timothy Sherwood

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood
    Pages 1-25
  3. Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood
    Pages 27-70
  4. Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood
    Pages 71-85
  5. Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood
    Pages 87-96
  6. Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood
    Pages 97-126
  7. Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood
    Pages 127-138
  8. Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood
    Pages 139-152
  9. Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner, Timothy Sherwood
    Pages 153-160
  10. Back Matter
    Pages 161-177

About this book

Introduction

The purpose of Handbook of FPGA Design Security is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. Handbook of FPGA Design Security combines theoretical underpinnings with a practical design approach and worked examples for combating real world threats. To address the spectrum of lifecycle and operational threats against FPGA systems, a holistic view of FPGA security is presented, from formal top level specification to low level policy enforcement mechanisms. This perspective integrates recent advances in the fields of computer security theory, languages, compilers, and hardware. The net effect is a diverse set of static and runtime techniques that, working in cooperation, facilitate the composition of robust, dependable, and trustworthy systems using commodity components.

Keywords

Field Programmable Gate Array (FPGA) Hardware-Oriented Security and Trust Policy Enforcement Reconfigurable hardware computer security design automation electronic design automation integrated circuit

Authors and affiliations

  • Ted Huffmire
    • 1
  • Cynthia Irvine
    • 2
  • Thuy D. Nguyen
    • 3
  • Timothy Levin
    • 4
  • Ryan Kastner
    • 5
  • Timothy Sherwood
    • 6
  1. 1.Department of Computer Science, Department of Computer ScienceNaval Postgraduate SchoolMontereyUSA
  2. 2.Department of Computer Science, Department of Computer ScienceNaval Postgraduate SchoolMontereyUSA
  3. 3.Department of Computer Science, Department of Computer ScienceNaval Postgraduate SchoolMontereyUSA
  4. 4.Department of Computer Science, Department of Computer ScienceNaval Postgraduate SchoolMontereyUSA
  5. 5.Dept. of Computer Science and Eng., Dept. of Computer Science and Eng.University of California, San DiegoLa JollaUSA
  6. 6., Department of Computer ScienceUC, Santa BarbaraSanta BarbaraUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-90-481-9157-4
  • Copyright Information Springer Science+Business Media B.V. 2010
  • Publisher Name Springer, Dordrecht
  • eBook Packages Engineering
  • Print ISBN 978-90-481-9156-7
  • Online ISBN 978-90-481-9157-4
  • Buy this book on publisher's site