How to Break Secure Boot on FPGA SoCs through Malicious Hardware.
Nisha JacobJohann HeyszlAndreas ZanklCarsten RolfesGeorg SiglPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- field programmable gate array
- hardware implementation
- hardware architecture
- parallel hardware
- hardware design
- low cost
- software implementation
- real time
- single chip
- dedicated hardware
- hardware architectures
- fpga implementation
- embedded systems
- reconfigurable hardware
- hardware and software
- data acquisition
- low power consumption
- xilinx virtex
- fpga technology
- programmable logic
- image processing algorithms
- fpga device
- fpga hardware
- real time image processing
- image processing
- signal processing
- hardware description language
- hardware software co design
- digital signal processing
- security mechanisms
- malicious behavior
- security requirements
- hardware software
- trusted computing
- parallel architecture
- high end
- security analysis
- security issues
- massively parallel
- computer systems
- high speed