Private Verification for FPGA Bitstreams
暂无分享,去创建一个
[1] Peter M. Athanas,et al. Torc: towards an open-source tool flow , 2011, FPGA '11.
[2] Christof Paar,et al. FPGA Trojans Through Detecting and Weakening of Cryptographic Primitives , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[3] Qiang Wu,et al. Deriving an NCD file from an FPGA bitstream: Methodology, architecture and evaluation , 2013, Microprocess. Microsystems.
[4] Sorin A. Huss,et al. Bil: A tool-chain for bitstream reverse-engineering , 2012, 22nd International Conference on Field Programmable Logic and Applications (FPL).
[5] Steven Trimberger. Trusted Design in FPGAs , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[6] Jonathan Graf,et al. The Integrity of FPGA Designs: Capabilities Enabled by Unlocking Bitstreams and 3rd-Party IP , 2012 .
[7] Yiorgos Makris,et al. Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition , 2012, IEEE Transactions on Information Forensics and Security.