{"id":"https://openalex.org/W2979885257","doi":"https://doi.org/10.1145/3338508.3359573","title":"SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption","display_name":"SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption","publication_year":2019,"publication_date":"2019-11-08","ids":{"openalex":"https://openalex.org/W2979885257","doi":"https://doi.org/10.1145/3338508.3359573","mag":"2979885257"},"language":"en","primary_location":{"id":"doi:10.1145/3338508.3359573","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338508.3359573","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pureadmin.qub.ac.uk/ws/files/180559633/ASHES_2019_paper_17.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023787283","display_name":"Florian Unterstein","orcid":"https://orcid.org/0000-0002-8384-2021"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Florian Unterstein","raw_affiliation_strings":["Fraunhofer Institute for Applied and Integrated Security AISEC, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security AISEC, Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078816811","display_name":"Nisha Jacob","orcid":"https://orcid.org/0000-0002-5603-6243"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Nisha Jacob","raw_affiliation_strings":["Fraunhofer Institute for Applied and Integrated Security AISEC, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security AISEC, Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048053456","display_name":"Neil Hanley","orcid":"https://orcid.org/0000-0002-2595-7648"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Neil Hanley","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), ECIT, Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), ECIT, Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089292929","display_name":"Chongyan Gu","orcid":"https://orcid.org/0000-0002-3028-8004"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chongyan Gu","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), ECIT, Queen's University Belfast, Belfast, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), ECIT, Queen's University Belfast, Belfast, United Kingdom","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107225611","display_name":"Johann Heyszl","orcid":"https://orcid.org/0000-0002-8425-3114"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Johann Heyszl","raw_affiliation_strings":["Fraunhofer Institute for Applied and Integrated Security AISEC, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security AISEC, Munich, Germany","institution_ids":["https://openalex.org/I4210136922"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023787283"],"corresponding_institution_ids":["https://openalex.org/I4210136922"],"apc_list":null,"apc_paid":null,"fwci":0.9832,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.74821337,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"43","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864548563957214},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.7679970264434814},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.754934549331665},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.725182056427002},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.7133064270019531},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6328865885734558},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5191099643707275},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.47059619426727295},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.46594536304473877},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4510849118232727},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4068870544433594},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28807616233825684},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.14929541945457458}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864548563957214},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.7679970264434814},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.754934549331665},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.725182056427002},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.7133064270019531},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6328865885734558},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5191099643707275},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.47059619426727295},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.46594536304473877},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4510849118232727},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4068870544433594},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28807616233825684},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.14929541945457458},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3338508.3359573","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338508.3359573","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/eea5a288-1944-439f-ac8f-d9f14d069da1","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/eea5a288-1944-439f-ac8f-d9f14d069da1","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/180559633/ASHES_2019_paper_17.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Unterstein, F, Jacob, N, Hanley, N, Gu, C & Heyzl, J 2019, SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption. in ASHES 2019 - Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 45-53, 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES 2019, a Post-Conference Satellite Workshop of the ACM Conference on Computer and Communications Security, CCS 2019, London, United Kingdom, 15/11/2019. https://doi.org/10.1145/3338508.3359573, https://doi.org/10.1145/3338508.3359573","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:fraunhofer.de:N-629178","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-629178.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer AISEC","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/411036","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/411036","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/eea5a288-1944-439f-ac8f-d9f14d069da1","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/eea5a288-1944-439f-ac8f-d9f14d069da1","pdf_url":"https://pureadmin.qub.ac.uk/ws/files/180559633/ASHES_2019_paper_17.pdf","source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Unterstein, F, Jacob, N, Hanley, N, Gu, C & Heyzl, J 2019, SCA Secure and Updatable Crypto Engines for FPGA SoC Bitstream Decryption. in ASHES 2019 - Proceedings of the 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery, pp. 45-53, 3rd ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES 2019, a Post-Conference Satellite Workshop of the ACM Conference on Computer and Communications Security, CCS 2019, London, United Kingdom, 15/11/2019. https://doi.org/10.1145/3338508.3359573, https://doi.org/10.1145/3338508.3359573","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2241406505","display_name":null,"funder_award_id":"EP/R007187/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6577499357","display_name":null,"funder_award_id":"EP/N508664/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2979885257.pdf","grobid_xml":"https://content.openalex.org/works/W2979885257.grobid-xml"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W25365497","https://openalex.org/W57300150","https://openalex.org/W1504211573","https://openalex.org/W1527529076","https://openalex.org/W1544967376","https://openalex.org/W1595334710","https://openalex.org/W1922829621","https://openalex.org/W1952573265","https://openalex.org/W1995447946","https://openalex.org/W2000171858","https://openalex.org/W2032551902","https://openalex.org/W2061496435","https://openalex.org/W2093154965","https://openalex.org/W2127992996","https://openalex.org/W2129004891","https://openalex.org/W2155115217","https://openalex.org/W2166778460","https://openalex.org/W2181989096","https://openalex.org/W2199868977","https://openalex.org/W2246315406","https://openalex.org/W2296779301","https://openalex.org/W2301007129","https://openalex.org/W2478604032","https://openalex.org/W2499742630","https://openalex.org/W2555917385","https://openalex.org/W2613673407","https://openalex.org/W2626075395","https://openalex.org/W2745643874","https://openalex.org/W2747534894","https://openalex.org/W2766485173","https://openalex.org/W2785506110","https://openalex.org/W2790930562","https://openalex.org/W2884110449","https://openalex.org/W2899867281","https://openalex.org/W2949797438","https://openalex.org/W2950916851","https://openalex.org/W2951458793","https://openalex.org/W3194506215","https://openalex.org/W4239371705","https://openalex.org/W6764559135"],"related_works":["https://openalex.org/W4319430423","https://openalex.org/W4390224957","https://openalex.org/W4323831234","https://openalex.org/W2544043553","https://openalex.org/W4311839959","https://openalex.org/W2121309702","https://openalex.org/W1982685694","https://openalex.org/W49599899","https://openalex.org/W3217774925","https://openalex.org/W2040087757"],"abstract_inverted_index":{"FPGA":[0,102,139,178],"system":[1],"on":[2],"chips":[3],"(SoCs)":[4],"are":[5],"ideal":[6],"computing":[7],"platforms":[8],"for":[9,109,202],"edge":[10],"devices":[11],"in":[12,27,37,70,141,249],"applications":[13],"which":[14],"require":[15],"high":[16],"performance":[17],"through":[18],"hardware":[19,34],"acceleration":[20],"and":[21,46,95,160,210,239],"updatability":[22],"due":[23],"to":[24,121,135,170,245],"long":[25],"operation":[26],"the":[28,101,106,110,123,136,162,177,181,206,219,223,233],"field.":[29],"A":[30],"secure":[31],"update":[32,122],"of":[33,105,113,129,151,164,205,222,232],"functionality":[35],"can":[36],"general":[38],"be":[39],"achieved":[40],"by":[41],"using":[42,143],"built-in":[43,107],"cryptographic":[44,58,98,124,225],"engines":[45,59],"provided":[47,189],"secret":[48,153,175,190],"key":[49,154,191,201],"storage.":[50],"However,":[51],"reported":[52],"examples":[53],"have":[54],"shown":[55],"that":[56,91,186],"such":[57],"may":[60],"become":[61],"insecure":[62],"against":[63],"side-channel":[64,96,220],"attacks":[65],"at":[66],"any":[67,79],"later":[68],"point":[69],"time.":[71],"This":[72],"leaves":[73],"already":[74],"deployed":[75],"systems":[76],"vulnerable":[77],"without":[78],"clear":[80],"mitigation":[81],"options.":[82],"To":[83],"solve":[84],"this,":[85],"we":[86,131],"propose":[87],"a":[88,144,157,165,172,199],"comprehensive":[89],"concept":[90,118],"uses":[92],"an":[93,133,230],"alternative":[94],"protected":[97,224],"engine":[99,125,226],"within":[100,176],"logic":[103],"instead":[104],"one":[108],"crucial":[111],"task":[112],"bitstream":[114],"decryption.":[115],"Remarkably":[116],"this":[117,184,250],"even":[119],"allows":[120],"itself.":[126],"As":[127],"proof":[128],"concept,":[130],"describe":[132],"application":[134],"Xilinx":[137],"Zynq-7020":[138],"SoC":[140],"detail":[142],"leakage":[145],"resilient":[146],"decryption":[147],"engine.":[148],"The":[149,236],"lack":[150],"accessible":[152],"storage":[155,192],"poses":[156],"significant":[158],"challenge":[159],"requires":[161],"use":[163],"physical":[166],"unclonable":[167],"function":[168],"(PUF)":[169],"generate":[171],"device":[173],"intrinsic":[174],"logic.":[179],"At":[180],"same":[182],"time":[183],"means":[185],"no":[187],"manufacturer":[188],"or":[193],"cryptography":[194],"is":[195,242],"required":[196],"anymore;":[197],"only":[198],"public":[200],"signature":[203],"verification":[204],"first":[207],"stage":[208],"bootloader":[209],"initial":[211],"static":[212],"bitstream.":[213],"We":[214],"provide":[215],"empirical":[216],"results":[217],"proving":[218],"security":[221],"as":[227,229],"well":[228],"evaluation":[231],"PUF":[234],"quality.":[235],"full":[237],"design":[238],"source":[240],"code":[241],"made":[243],"available":[244],"encourage":[246],"further":[247],"research":[248],"direction.":[251]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
