Reversing a Lattice ECP3 FPGA for Bitstream Protection
暂无分享,去创建一个
[1] Alessandro Barenghi,et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.
[2] María José Moure,et al. Features, Design Tools, and Application Domains of FPGAs , 2007, IEEE Transactions on Industrial Electronics.
[3] Christof Paar,et al. Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs , 2015, TRETS.
[4] Eric Monmasson,et al. FPGAs in Industrial Control Applications , 2011, IEEE Transactions on Industrial Informatics.
[5] Steven Trimberger,et al. Three Ages of FPGAs: A Retrospective on the First Thirty Years of FPGA Technology , 2015, Proceedings of the IEEE.
[6] Swarup Bhunia,et al. Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures , 2014, GLSVLSI '14.
[7] Jean-Baptiste Note,et al. From the bitstream to the netlist , 2008, FPGA '08.
[8] Zied Marrakchi,et al. Tree-based Heterogeneous FPGA Architectures: Application Specific Exploration and Optimization , 2012 .
[9] María José Moure,et al. Advanced Features and Industrial Applications of FPGAs—A Review , 2015, IEEE Transactions on Industrial Informatics.
[10] George Kornaros,et al. Dynamic Power and Thermal Management of NoC-Based Heterogeneous MPSoCs , 2014, TRETS.
[11] Saar Drimer,et al. Security for volatile FPGAs , 2009 .
[12] Rajat Subhra Chakraborty,et al. Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream , 2013, IEEE Design & Test.
[13] Jonathan Rose,et al. Measuring the Gap Between FPGAs and ASICs , 2007, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[14] Zied Marrakchi,et al. FPGA Architectures: An Overview , 2012 .
[15] Qiang Wu,et al. Deriving an NCD file from an FPGA bitstream: Methodology, architecture and evaluation , 2013, Microprocess. Microsystems.