FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems. Shila, D., Venugopalan, V., & Patterson, C. In IEEE High Performance Extreme Computing Conference (HPEC), pages 1-7, September, 2015. bibtex @inproceedings{Shila2015FIDES-Enh,
author = {Shila, Devu and Venugopalan, Vivek and Patterson, Cameron},
booktitle = {IEEE High Performance Extreme Computing Conference (HPEC)},
date-added = {2020-01-20 18:26:09 -0500},
date-modified = {2020-01-20 18:26:09 -0500},
keywords = {Security; authorisation;field programmable gate arrays;logic design;reconfigurable architectures;FIDES architecture;FPGA IP cores;FPGA application design process;FPGA application development process;HDL;IP core communication activities;Xilinx Zynq 7020 device;access control policies;anomaly detection capability;behavior learning techniques;bit-stream protection measures;embedding;fidelity enhancing security methodology;logic resources;minimal latency;netlist;nonsensitive IP cores;open source tools;overhead;reconfigurable based hardware systems;red-black system;sensitive IP cores;tag verification;third-party IP cores;trusted environment;Field programmable gate arrays;Hardware;IP networks;Monitoring;Tagging;Trojan horses;Design;FPGAs;Hardware Trojans;Security and Trust},
month = sep,
pages = {1-7},
title = {{FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems}},
year = {2015},
Bdsk-File-1 = {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},
Bdsk-Url-1 = {http://dx.doi.org/10.1109/HPEC.2015.7322483}}
Downloads: 0
{"_id":"XZnL6jzaQuduMJWYM","bibbaseid":"shila-venugopalan-patterson-fidesenhancingtrustinreconfigurablebasedhardwaresystems-2015","downloads":0,"creationDate":"2016-02-09T06:00:28.675Z","title":"FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems","author_short":["Shila, D.","Venugopalan, V.","Patterson, C."],"year":2015,"bibtype":"inproceedings","biburl":"https://bibbase.org/f/R3LGkkqj3uPfqr3NM/vivekv-isi-edu.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"propositions":[],"lastnames":["Shila"],"firstnames":["Devu"],"suffixes":[]},{"propositions":[],"lastnames":["Venugopalan"],"firstnames":["Vivek"],"suffixes":[]},{"propositions":[],"lastnames":["Patterson"],"firstnames":["Cameron"],"suffixes":[]}],"booktitle":"IEEE High Performance Extreme Computing Conference (HPEC)","date-added":"2020-01-20 18:26:09 -0500","date-modified":"2020-01-20 18:26:09 -0500","keywords":"Security; authorisation;field programmable gate arrays;logic design;reconfigurable architectures;FIDES architecture;FPGA IP cores;FPGA application design process;FPGA application development process;HDL;IP core communication activities;Xilinx Zynq 7020 device;access control policies;anomaly detection capability;behavior learning techniques;bit-stream protection measures;embedding;fidelity enhancing security methodology;logic resources;minimal latency;netlist;nonsensitive IP cores;open source tools;overhead;reconfigurable based hardware systems;red-black system;sensitive IP cores;tag verification;third-party IP cores;trusted environment;Field programmable gate arrays;Hardware;IP networks;Monitoring;Tagging;Trojan horses;Design;FPGAs;Hardware Trojans;Security and Trust","month":"September","pages":"1-7","title":"FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems","year":"2015","bdsk-file-1":"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","bdsk-url-1":"http://dx.doi.org/10.1109/HPEC.2015.7322483","bibtex":"@inproceedings{Shila2015FIDES-Enh,\n\tauthor = {Shila, Devu and Venugopalan, Vivek and Patterson, Cameron},\n\tbooktitle = {IEEE High Performance Extreme Computing Conference (HPEC)},\n\tdate-added = {2020-01-20 18:26:09 -0500},\n\tdate-modified = {2020-01-20 18:26:09 -0500},\n\tkeywords = {Security; authorisation;field programmable gate arrays;logic design;reconfigurable architectures;FIDES architecture;FPGA IP cores;FPGA application design process;FPGA application development process;HDL;IP core communication activities;Xilinx Zynq 7020 device;access control policies;anomaly detection capability;behavior learning techniques;bit-stream protection measures;embedding;fidelity enhancing security methodology;logic resources;minimal latency;netlist;nonsensitive IP cores;open source tools;overhead;reconfigurable based hardware systems;red-black system;sensitive IP cores;tag verification;third-party IP cores;trusted environment;Field programmable gate arrays;Hardware;IP networks;Monitoring;Tagging;Trojan horses;Design;FPGAs;Hardware Trojans;Security and Trust},\n\tmonth = sep,\n\tpages = {1-7},\n\ttitle = {{FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems}},\n\tyear = {2015},\n\tBdsk-File-1 = {YnBsaXN0MDDSAQIDBFxyZWxhdGl2ZVBhdGhZYWxpYXNEYXRhXxArLi4vLi4vcmVmZXJlbmNlcy9QREYvU2hpbGEyMDE1RklERVMtRW5oLnBkZk8RAXwAAAAAAXwAAgAADE1hY2ludG9zaCBIRAAAAAAAAAAAAAAAAAAAAAAAAABCRAAB/////xZTaGlsYTIwMTVGSURFUy1FbmgucGRmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/////AAAAAAAAAAAAAAAAAAIAAwAACiBjdQAAAAAAAAAAAAAAAAADUERGAAACADwvOlVzZXJzOnZpdmVrdjpEcm9wYm94OnJlZmVyZW5jZXM6UERGOlNoaWxhMjAxNUZJREVTLUVuaC5wZGYADgAuABYAUwBoAGkAbABhADIAMAAxADUARgBJAEQARQBTAC0ARQBuAGgALgBwAGQAZgAPABoADABNAGEAYwBpAG4AdABvAHMAaAAgAEgARAASADpVc2Vycy92aXZla3YvRHJvcGJveC9yZWZlcmVuY2VzL1BERi9TaGlsYTIwMTVGSURFUy1FbmgucGRmABMAAS8AABUAAgAN//8AAAAIAA0AGgAkAFIAAAAAAAACAQAAAAAAAAAFAAAAAAAAAAAAAAAAAAAB0g==},\n\tBdsk-Url-1 = {http://dx.doi.org/10.1109/HPEC.2015.7322483}}\n\n","author_short":["Shila, D.","Venugopalan, V.","Patterson, C."],"bibbaseid":"shila-venugopalan-patterson-fidesenhancingtrustinreconfigurablebasedhardwaresystems-2015","role":"author","urls":{},"keyword":["Security; authorisation;field programmable gate arrays;logic design;reconfigurable architectures;FIDES architecture;FPGA IP cores;FPGA application design process;FPGA application development process;HDL;IP core communication activities;Xilinx Zynq 7020 device;access control policies;anomaly detection capability;behavior learning techniques;bit-stream protection measures;embedding;fidelity enhancing security methodology;logic resources;minimal latency;netlist;nonsensitive IP cores;open source tools;overhead;reconfigurable based hardware systems;red-black system;sensitive IP cores;tag verification;third-party IP cores;trusted environment;Field programmable gate arrays;Hardware;IP networks;Monitoring;Tagging;Trojan horses;Design;FPGAs;Hardware Trojans;Security and Trust"],"metadata":{"authorlinks":{}}},"search_terms":["fides","enhancing","trust","reconfigurable","based","hardware","systems","shila","venugopalan","patterson"],"keywords":["security; authorisation;field programmable gate arrays;logic design;reconfigurable architectures;fides architecture;fpga ip cores;fpga application design process;fpga application development process;hdl;ip core communication activities;xilinx zynq 7020 device;access control policies;anomaly detection capability;behavior learning techniques;bit-stream protection measures;embedding;fidelity enhancing security methodology;logic resources;minimal latency;netlist;nonsensitive ip cores;open source tools;overhead;reconfigurable based hardware systems;red-black system;sensitive ip cores;tag verification;third-party ip cores;trusted environment;field programmable gate arrays;hardware;ip networks;monitoring;tagging;trojan horses;design;fpgas;hardware trojans;security and trust"],"authorIDs":[],"dataSources":["MhetGwzdnqQv3dJWT","i5A8jKqyW67R7nn75","oodiEqv3HQNeZtGeC"]}