How to Break Secure Boot on FPGA SoCs Through Malicious Hardware.
Nisha JacobJohann HeyszlAndreas ZanklCarsten RolfesGeorg SiglPublished in: CHES (2017)
Keyphrases
- field programmable gate array
- hardware implementation
- hardware architecture
- parallel hardware
- low cost
- hardware design
- software implementation
- dedicated hardware
- single chip
- hardware architectures
- programmable logic
- fpga implementation
- real time
- reconfigurable hardware
- parallel computing
- fpga technology
- hardware and software
- data acquisition
- fpga device
- hardware software
- low power consumption
- parallel architecture
- xilinx virtex
- image processing algorithms
- embedded systems
- signal processing
- low power
- digital signal processing
- security requirements
- hardware description language
- real time image processing
- computing systems
- computer systems
- high speed
- high end
- fpga hardware
- power reduction
- trusted computing
- key management
- security mechanisms
- security issues
- computational power
- image processing