000 03443nam a22004095i 4500
001 311778
003 MX-SnUAN
005 20160429160515.0
007 cr nn 008mamaa
008 150903s2011 ne | o |||| 0|eng d
020 _a9789400713383
_99789400713383
024 7 _a10.1007/9789400713383
_2doi
035 _avtls000366527
039 9 _a201509030703
_bVLOAD
_c201405070428
_dVLOAD
_y201402251338
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aTK7888.4
100 1 _aBadrignans, Benoit.
_eeditor.
_9353147
245 1 0 _aSecurity Trends for FPGAS :
_bFrom Secured to Secure Reconfigurable Systems /
_cedited by Benoit Badrignans, Jean Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres.
264 1 _aDordrecht :
_bSpringer Netherlands,
_c2011.
300 _axx, 252 páginas 85 ilustraciones
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
500 _aSpringer eBooks
505 0 _a1. Introduction and Objectives -- 2. Security FPGA Analysis -- 3. Side Channel Attacks -- 4. Countermeasures against Physical Attacks in FPGAs -- 5. True Random Number Generators in FPGAs -- 6. Embedded Systems Security for FPGA -- 7. Conclusions.
520 _aThis book is designed for all those who would like to upgrade their knowledge in the field of security and digital platforms including reconfigurable FPGAs.  It is the result of a national project (ICTER) funded by the French National Research Agency (ANR) and involving four research centers (Montpellier, Paris, Lorient, Saint-Etienne) and a private company. This book details several solutions for secure application execution and application update.  It presents an analysis of current threats against embedded systems and especially FPGAs. The discussion includes requirements to build a secure system, according to the FIPS standard. New secure schemes are proposed to ensure data confidentiality, integrity and authentication.  These new schemes fit the tight requirements of embedded systems (performance, memory footprint, logic area and energy consumption).  The cost of different architectures for performance, memory, and energy are estimated. Innovative solutions for remote reconfigurations are also detailed, taking into account security when downloading a new bitstream.  Since the replay of an old bitstream in the field is a major threat for embedded systems, this issue is discussed and an original solution proposed. Proposes solutions at the logical, architecture and system levels in order to provide a global solution Clearly defines the security boundaries for a system Describes different hierarchical levels of a design, from application to technological levels
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aDanger, Jean Luc.
_eeditor.
_9353148
700 1 _aFischer, Viktor.
_eeditor.
_9353149
700 1 _aGogniat, Guy.
_eeditor.
_9353150
700 1 _aTorres, Lionel.
_eeditor.
_9353151
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9789400713376
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-94-007-1338-3
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c311778
_d311778