1,243 research outputs found

    A comparison of PUF cores suitable for FPGA devices

    Get PDF
    A PUF extracts a unique identifier per die using physical random variation caused by variability of the manufacturing process. PUFs can be used for hardware authentication, but also as generators of confidential keys. This paper presents the comparison of RO-PUF and TERO-PUF cores implemented on Xilinx Spartan 6 FPGA. The objective is to evaluate their design when operating at the same conditions. We show that no ideal PUF exists and therefore designers will always have to choose the PUF matching the security application. In addition to design parameters like area, number of bits per challenge and power consumption, we discuss the feasibility of the design in FPGAs. This will help designers select the best PUF according to their requirements

    Teaching FPGA Security

    No full text
    International audienceTeaching FPGA security to electrical engineering students is new at graduate level. It requires a wide field of knowledge and a lot of time. This paper describes a compact course on FPGA security that is available to electrical engineering master's students at the Saint-Etienne Institute of Telecom, University of Lyon, France. It is intended for instructors who wish to design a new course on this topic. The paper reviews the motivation for the course, the pedagogical issues involved, the curriculum, the lab materials and tools used, and the results. Details are provided on two original lab sessions, in particular, a compact lab that requires students to perform differential power analysis of FPGA implementation of the AES symmetric cipher. The paper gives numerous relevant references to allow the reader to prepare a similar curriculum

    Des terminaux green reconfigurables - vers une Ă©lectronique durable

    No full text
    Vers une Ă©lectronique durable ..

    On the Eminent Dignity of the Poor in the Church: A Sermon by Jacques BĂ©nigne Bossuet

    Get PDF
    Jacques Benigne Bossuet gave this public sermon at Vincent de Paul’s request in 1659. It was written during a time of unprecedented poverty, when the French government was forcing the poor into institutions. Bossuet’s sermon “represents a classic statement of the theology of the seventeenth century’s charitable revival.” Its thesis is that like Jesus, the Church reverses the order of the temporal world to mirror that of the kingdom of God. The rich have all the privileges and advantages of the world, but the kingdom of God and the Church belong to the poor. This is because Jesus chose to be poor as part of the new covenant. The rich may only gain the blessings of heaven if they respect and serve the poor, and this is their only admittance to the Church. Edward Udovic’s introduction to the sermon outlines Bossuet’s career, his relationship to Vincent de Paul, and Vincent’s influence on him

    Functional Locking Modules for Design Protection of Intellectual Property Cores

    No full text
    International audienceElectronics systems design is increasingly uses Intellectual Property (IP) cores. The means, however, that can renderthe IP core unusable if it has been obtained illegally have not yet been identified. We describe lightweight locking schemes lacking in the state of the art

    A Survey of hardware protection of design data for integrated circuits and intellectual properties

    No full text
    International audienceThis paper reviews the current situation regarding design protection in the microelectronics industry. Over the past ten years, the designers of integrated circuits and intellectual properties have faced increasing threats including counterfeiting, reverse-engineering and theft. This is now a critical issue for the microelectronics industry, mainly for fabless designers and intellectual properties designers. Coupled with increasing pressure to decrease the cost and increase the performance of integrated circuits, the design of a secure, efficient, lightweight protection scheme for design data is a serious challenge for the hardware security community. However, several published works propose different ways to protect design data including functional locking, hardware obfuscation, and IC/IP identification. This paper presents a survey of academic research on the protection of design data. It concludes with the need to design an efficient protection scheme based on several properties

    Les aménagements des rives du Doubs à Epomanduodurum. Impact de l'aléa fluvial sur le développement d'une agglomération antique.

    Get PDF
    L'agglomération antique de Mandeure-Mathay (Epomanduodurum), considérée comme la seconde du pays Séquane par la taille et la parure monumentale, derrière la capitale de cité, Besançon (Marc et al. 2007), fait l'objet d'un Programme Collectif de Recherche depuis 2001. Il vise à une compréhension globale du fonctionnement de la ville et de son espace territorial, suivant une démarche diachronique et pluridisciplinaire. D'un point de vue paléohydrographique quelques grandes questions ont été retenues comme colonne vertébrale du projet scientifique. Suivant quelles modalités l'agglomération du Haut-Empire se développe-t-elle et s'organise-t-elle à l'intérieur de la boucle du Doubs, quelle est la part des facteurs naturels dans cette organisation ? Concernant ces deux aspects de notre recherche, les études conduites depuis 2005 sur le site d'Epomanduodurum, nous ont permis d'acquérir de nouvelles informations sur les dynamiques hydrologiques et sur les relations homme-milieu dans ce secteur de la moyenne vallée du Doubs

    SALWARE: Salutary Hardware to design Trusted IC.

    No full text
    Fabless semiconductor industries are facing the rise of design costs of integrated circuits. This rise is link to the technology change and the complexity increasing. It follows that integrated circuits have become targets of counterfeiting and theft. The SALWARE project aims to study (theoretically and experimentally) salutary hardware design in order to fight against theft, illegal cloning and counterfeiting of integrated circuits. Salutary hardware means an embedded hardware system, hardly detectable / circumvented, inserted in an integrated circuit or a virtual component (Intellectual Property), used to provide intellectual property information (eg watermarking or hardware license) and / or to remotely activate the circuit or IP after manufacture and during use

    Automatic low-cost IP watermarking technique based on output mark insertions

    No full text
    International audienceToday, although intellectual properties (IP) and their reuse are common, their use is causing design security issues: illegal copying, counterfeiting, and reverse engineering. IP watermarking is an efficient way to detect an unauthorized IP copy or a counterfeit. In this context, many interesting solutions have been proposed. However, few combine the watermarking process with synthesis. This article presents a new solution, i.e. automatic low cost IP watermarking included in the high-level synthesis process. The proposed method differs from those cited in the literature as the marking is not material, but is based on mathematical relationships between numeric values as inputs and outputs at specified times. Some implementation results with Xilinx Virtex-5 FPGA that the proposed solution required a lower area and timing overhead than existing solutions
    • …
    corecore