Fa   |   Ar   |   En
   Secure Fpga Design By Filling Unused Spaces  
نویسنده Labbafniya Mansoureh ,Saeidi Roghaye
منبع The Isc International Journal Of Information Security - 2019 - دوره : 11 - شماره : 1 - صفحه:47 -56
چکیده    There are di erent kinds of attacks on field programmable gate array (fpga). as fpgas are used in many di erent applications, its security becomes an important concern, especially in internet of things (iot) applications. hardware trojan horse (hth) insertion is one of the major security threats that can be implemented in unused space of the fpga. this unused space is unavoidable to meet the place and route requirements. in this paper, we introduce an ecient method to ll this space and thus leaving no free space for inserting hths. using a shift register in combination with gate-chain is the best way of lling unused space, which incurs a no increase in power consumption of the main design. experimental results of implementing a set of iwls benchmarks on xilinx virtex devices show that the proposed prevention and detection scheme imposes a no power overhead and no degradation to performance and critical path delay of the main design.
کلیدواژه Field Programmable Gate Array ,Security ,Controllable Point ,Observable Points ,Hardware Trojan Horses
آدرس University Of Isfahan, Faculty Of Computer Engineering, ایران, Information And Communication Technology Research Institute, ایران
پست الکترونیکی rosaeidi@yahoo.com

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved