{"id":"https://openalex.org/W3134493110","doi":"https://doi.org/10.1109/asianhost51057.2020.9358258","title":"FPGA Accelerated Embedded System Security Through Hardware Isolation","display_name":"FPGA Accelerated Embedded System Security Through Hardware Isolation","publication_year":2020,"publication_date":"2020-12-15","ids":{"openalex":"https://openalex.org/W3134493110","doi":"https://doi.org/10.1109/asianhost51057.2020.9358258","mag":"3134493110"},"language":"en","primary_location":{"id":"doi:10.1109/asianhost51057.2020.9358258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost51057.2020.9358258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015406724","display_name":"Sujan Kumar Saha","orcid":"https://orcid.org/0000-0002-7275-7980"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sujan Kumar Saha","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081869234","display_name":"Christophe Bobda","orcid":"https://orcid.org/0000-0002-9042-9470"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christophe Bobda","raw_affiliation_strings":["University of Florida"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5015406724"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":1.6172,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.84364111,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.7623544335365295},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.7603250741958618},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7468307614326477},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5930521488189697},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5495626926422119},{"id":"https://openalex.org/keywords/hardware-acceleration","display_name":"Hardware acceleration","score":0.5251105427742004},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5170329213142395},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.5051248669624329},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3423123359680176}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.7623544335365295},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.7603250741958618},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7468307614326477},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5930521488189697},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5495626926422119},{"id":"https://openalex.org/C13164978","wikidata":"https://www.wikidata.org/wiki/Q600158","display_name":"Hardware acceleration","level":3,"score":0.5251105427742004},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5170329213142395},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.5051248669624329},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3423123359680176},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asianhost51057.2020.9358258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asianhost51057.2020.9358258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W157928049","https://openalex.org/W1591070193","https://openalex.org/W1980982306","https://openalex.org/W2005126871","https://openalex.org/W2017358384","https://openalex.org/W2020807844","https://openalex.org/W2047111620","https://openalex.org/W2068615994","https://openalex.org/W2093154965","https://openalex.org/W2122711125","https://openalex.org/W2142963883","https://openalex.org/W2167911131","https://openalex.org/W2168341026","https://openalex.org/W2549730713","https://openalex.org/W2581963379","https://openalex.org/W2800163980","https://openalex.org/W2802377270","https://openalex.org/W2808716404","https://openalex.org/W2889555464","https://openalex.org/W2949333414","https://openalex.org/W4252521681","https://openalex.org/W6645642916","https://openalex.org/W6684410126"],"related_works":["https://openalex.org/W2111241003","https://openalex.org/W2355315220","https://openalex.org/W4200391368","https://openalex.org/W2210979487","https://openalex.org/W2074043759","https://openalex.org/W2316202402","https://openalex.org/W2113594494","https://openalex.org/W2518118925","https://openalex.org/W3159273459","https://openalex.org/W3152699334"],"abstract_inverted_index":{"Modern":[0],"embedded":[1,47,77,142],"systems":[2,48],"include":[3],"on-chip":[4],"FPGA":[5,75],"along":[6],"with":[7,144,160],"processors":[8],"to":[9,18,20,54,96,111],"meet":[10],"the":[11,55,109,153],"high":[12],"computation":[13],"demand":[14],"by":[15,33],"providing":[16],"flexibility":[17],"users":[19],"add":[21],"custom":[22,35,145],"hardware":[23,38,97,110,117,158],"accelerators.":[24],"Any":[25],"confidential":[26,106],"or":[27,37],"sensitive":[28],"information":[29,120],"may":[30],"be":[31,59,136],"processed":[32],"those":[34],"accelerators":[36,98],"Intellectual":[39],"Properties":[40],"(IPs).":[41],"Existing":[42],"accelerator":[43,146],"usage":[44],"models":[45],"in":[46,99,108],"do":[49],"not":[50],"prevent":[51,112],"illegal":[52],"access":[53],"IPs,":[56],"which":[57,131],"can":[58,135],"a":[60,69,125,161],"severe":[61],"security":[62,82],"breach.":[63],"In":[64],"this":[65],"paper,":[66],"we":[67],"present":[68],"hardware-software":[70],"co-design":[71],"approach":[72],"for":[73],"secured":[74,103,157],"accelerated":[76],"system":[78,143],"design.":[79],"Our":[80],"proposed":[81,129,154],"framework":[83,155],"inherits":[84],"Mandatory":[85],"Access":[86],"Control":[87],"(MAC)":[88],"based":[89],"authentication":[90],"policies":[91],"running":[92],"at":[93,116],"software":[94,113],"down":[95],"FPGA.":[100],"It":[101],"ensures":[102],"processing":[104],"of":[105,127,164],"data":[107],"originated":[114],"attacks":[115],"IPs":[118],"and":[119,166],"leaks.":[121],"We":[122],"have":[123],"implemented":[124],"prototype":[126],"our":[128],"framework,":[130],"shows":[132],"that":[133,152],"it":[134],"easily":[137],"integrated":[138],"while":[139],"designing":[140],"an":[141],"IPs.":[147],"The":[148],"experimental":[149],"results":[150],"show":[151],"establishes":[156],"execution":[159],"negligible":[162],"amount":[163],"area":[165],"performance":[167],"overhead.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
