Z. Collins, Bayley King, R. Jha, David Kapp, A. Ralescu
{"title":"通过各种变体实现安全的可进化硬件","authors":"Z. Collins, Bayley King, R. Jha, David Kapp, A. Ralescu","doi":"10.1109/NAECON46414.2019.9058062","DOIUrl":null,"url":null,"abstract":"Evolvable hardware is attractive as a design strategy to hardware engineers, but suffers due to its lack of scalability to larger hardware systems. This work examines how hardware designers can make use of evolvable hardware to improve the security of their systems, and to create hardware systems that are better resistant to reverse engineering.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Evolvable Hardware for Security through Diverse Variants\",\"authors\":\"Z. Collins, Bayley King, R. Jha, David Kapp, A. Ralescu\",\"doi\":\"10.1109/NAECON46414.2019.9058062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Evolvable hardware is attractive as a design strategy to hardware engineers, but suffers due to its lack of scalability to larger hardware systems. This work examines how hardware designers can make use of evolvable hardware to improve the security of their systems, and to create hardware systems that are better resistant to reverse engineering.\",\"PeriodicalId\":193529,\"journal\":{\"name\":\"2019 IEEE National Aerospace and Electronics Conference (NAECON)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE National Aerospace and Electronics Conference (NAECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAECON46414.2019.9058062\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON46414.2019.9058062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evolvable Hardware for Security through Diverse Variants
Evolvable hardware is attractive as a design strategy to hardware engineers, but suffers due to its lack of scalability to larger hardware systems. This work examines how hardware designers can make use of evolvable hardware to improve the security of their systems, and to create hardware systems that are better resistant to reverse engineering.