All Questions
4
questions
1
vote
1
answer
136
views
Strategy against Side Channel Attack
I am newbie to Hardware Security. While studying Side Channel Attack, I realized that power consumption profile of electronic control unit is a key to encrypt what algorithm runs on it. I thought ...
25
votes
5
answers
7k
views
Why are SRAM based FPGA used more than NVM based FPGA?
SRAM based FPGAs need to load the bitstream again after power off. Meanwhile the Non-Volatile based one don't need that.
I wonder, why are more experiments and security research done on the SRAM ...
2
votes
1
answer
149
views
What makes Smartfusion2 FPGA clamed as highly secure to ensure secure booting?
Is the FPGA Smatfusion2 claimed to be highly secure by its manufacturer (Microsemi, now Mircochip) because it is a non volatile memory FPGA? Meanwhile the SRAM FPGA like the zynq 7000 are considered ...
-2
votes
2
answers
1k
views
FPGA: Reverse Engineer Design [closed]
I am looking to determine the plausibility of reverse engineering a design from an FPGA. Suppose a company fabricates their revolutionary design on FPGAs and I have managed to acquire one. My goal is ...