Security Trends for FPGAS

From Secured to Secure Reconfigurable Systems

Nonfiction, Computers, Advanced Computing, Programming, Expert Systems, Science & Nature, Technology, Electronics, Circuits
Cover of the book Security Trends for FPGAS by , Springer Netherlands
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9789400713383
Publisher: Springer Netherlands Publication: June 20, 2011
Imprint: Springer Language: English
Author:
ISBN: 9789400713383
Publisher: Springer Netherlands
Publication: June 20, 2011
Imprint: Springer
Language: English

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

More books from Springer Netherlands

Cover of the book Emilie du Châtelet between Leibniz and Newton by
Cover of the book Etudes Penologiques Studies in Penology dedicated to the memory of Sir Lionel Fox, C.B., M.C. / Etudes Penologiques dédiées à la mémoire de Sir Lionel Fox, C.B., M.C. by
Cover of the book The Soils of Serbia by
Cover of the book The Comedian as the Letter D: Erasmus Darwin’s Comic Materialism by
Cover of the book Heidegger et le problème de la mort by
Cover of the book Oceanography from Space by
Cover of the book Philosophical Reflections on Disability by
Cover of the book Doing Good with Technologies: by
Cover of the book Technologies for Medical Sciences by
Cover of the book Morphology and Evolution of Turtles by
Cover of the book The Stages of Human Life by
Cover of the book Mining and the Freshwater Environment by
Cover of the book The Rise of the Social Sciences and the Formation of Modernity by
Cover of the book Volcanic Successions Modern and Ancient by
Cover of the book Passionate Deliberation by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy