A Systematic Literature Review on Vulnerabilities, Mitigation Techniques, and Attacks in Field-Programmable Gate Arrays

A Alsuwaiyan, AA Habib, AB Imoukhuede… - Arabian Journal for …, 2024 - Springer
This paper presents a systematic literature review (SLR) of the vulnerabilities of field-
programmable gate arrays (FPGAs), based on 51 carefully selected articles from a pool of …

FPGA Bitstream Modification: Attacks and Countermeasures

M Moraitis - IEEE Access, 2023 - ieeexplore.ieee.org
Advances in Field-Programmable Gate Array (FPGA) technology in recent years have
resulted in an expansion of its usage in a very wide spectrum of applications. Apart from …

On the feasibility of using evolvable hardware for hardware Trojan detection and prevention

M Labafniya, S Picek, SE Borujeni, N Mentens - Applied Soft Computing, 2020 - Elsevier
Evolvable hardware (EH) architectures are capable of changing their configuration and
behavior dynamically based on inputs from the environment. In this paper, we investigate …

Configuration security of fpga in iot using logic resource protection

S Meenakshi, M Nirmala Devi - … Conference on Advances in Electrical and …, 2021 - Springer
Field-programmable gate arrays (FPGAs) consist of configurable logic blocks that have the
reconfiguration property which provides the flexibility for the designer to reconfigure it for …

[PDF][PDF] Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing.

M Labafniya, SE Borujeni, R Saeidi - ISeCure, 2021 - academia.edu
Nowadays the security of the design is so important because of the different available
attacks to the system. the main aim of this paper is to improve the security of the circuit …

[HTML][HTML] Towards Securing the FPGA Bitstream: Exploiting Vulnerabilities and Implementing Countermeasures

M Moraitis - 2024 - diva-portal.org
Field-programmable gate arrays (FPGAs) are used across various industries due to their
high performance, energy efficiency, and reconfigurability. However, the major advantage of …

Detection of hardware Trojans using machine learning in SoC FPGAs

C Chithra, J Kokila… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
In this paper, a hardware trojan detection technique was proposed and implemented.
Initially, different hardware Trojan benchmarks based on AES encryption are collected and …

An Obfuscation Method Based on CFGLUTs for Security of FPGAs.

M Labafniya, SE Borujeni - ISeCure, 2021 - search.ebscohost.com
There are many different ways of securing FPGAs to prevent successful reverse
engineering. One of the common forms is obfuscation methods. In this paper, we proposed …

[PDF][PDF] ISeCure

M Labafniya, R Saeidi - 2023 - academia.edu
Nowadays, contactless intelligent cards are extensively used in applications that need
strong authentication and security feature protection. Among different cards from different …