FPGA-Rootkits Hiding Malicious Code inside the Hardware.
Markus KuceraMichael VetterPublished in: WISES (2007)
Keyphrases
- malicious code
- field programmable gate array
- hardware implementation
- hardware architecture
- parallel hardware
- static analysis
- low cost
- hardware design
- software implementation
- network traffic
- real time
- reverse engineering
- single chip
- hardware architectures
- fpga technology
- fpga implementation
- xilinx virtex
- dedicated hardware
- reconfigurable hardware
- low power consumption
- fpga hardware
- embedded systems
- computer viruses
- programmable logic
- hardware and software
- data acquisition
- efficient implementation
- high speed
- malicious behavior
- computing systems
- image processing
- general purpose processors
- fpga device
- massively parallel
- hardware software
- signal processing
- parallel computing
- real world
- software engineering
- data management
- power reduction
- parallel architecture