Indexed by:
Abstract:
In complex application environment, such as network, the attacker through tampering and other illegal means attacks reconfigurable devices, to attain their purposes that they destroy or forged hardware logic and firmware code purposes. The article proposes an new reconfigurable device that obtain a kind of configuration interface, control interface and check interface. The trusted server establishes a trusted channel which connected to the reconfigurable devices, and the trusted server through the trusted channel to configure, check and control the trusted reconfigurable device, to ensure the trustworthiness of reconfigurable devices.
Keyword:
Reprint Author's Address:
Email:
Source :
2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3
Year: 2011
Page: 300-303
Language: Chinese
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 0