Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс:
http://dspace.opu.ua/jspui/handle/123456789/14983
Полная запись метаданных
Поле DC | Значение | Язык |
---|---|---|
dc.contributor.author | Zashcholkin, Kostiantyn | - |
dc.contributor.author | Защолкін, Костянтин Вячеславович | - |
dc.contributor.author | Drozd, Oleksandr | - |
dc.contributor.author | Дрозд, Олександр Валентинович | - |
dc.contributor.author | Sulima, Yulian | - |
dc.contributor.author | Суліма, Юліан Юрійович | - |
dc.contributor.author | Ivanova, Olena | - |
dc.contributor.author | Іванова, Олена Миколаївна | - |
dc.contributor.author | Perebeinos, Ihor | - |
dc.contributor.author | Перебейнос, Ігор Олександрович | - |
dc.date.accessioned | 2025-02-25T11:45:57Z | - |
dc.date.available | 2025-02-25T11:45:57Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Zashcholkin, K., Drozd, O., Sulima, Yu., Ivanova, O., Perebeinos, I. (2020). Detection method of the probable integrity violation areas in FPGA-based safety-critical systems. International Journal of Computing, Volume 19, Issue 2, P. 282-289. | en |
dc.identifier.issn | 17276209 | - |
dc.identifier.uri | http://dspace.opu.ua/jspui/handle/123456789/14983 | - |
dc.description.abstract | The features of integrity monitoring of FPGA-based safety-critical systems are considered. Hardware Trojans are distinguished as one of the most dangerous types of malicious integrity violation of FPGA-based systems. The study has proved that Hardware Trojans can be implanted into the system (or system project) during its planned modification. In particular, it happens when the integrity monitoring, based on the hash sum usage, does not operate. Before running the integrity monitoring, one should ensure that Hardware Trojans were not implanted. Authors proposed the method for detecting the hardware Trojans location in the space of FPGA-based components of safety-critical systems. The method is based on the analysis of addressing to the values of calculated LUT units for these components in the normal and emergency modes of system operation. The hardware module for addressing the registration in accordance with the proposed method is implemented. | en |
dc.language.iso | en | en |
dc.publisher | Research Institute of Intelligent Computer Systems | en |
dc.subject | FPGA | en |
dc.subject | hardware Trojans | en |
dc.subject | integrity monitoring | en |
dc.subject | LUT-oriented architecture | en |
dc.subject | safety-critical systems | en |
dc.title | Detection method of the probable integrity violation areas in FPGA-based safety-critical systems | en |
dc.type | Article in Scopus | en |
opu.citation.journal | International Journal of Computing | en |
opu.citation.volume | 19 | en |
opu.citation.firstpage | 282 | en |
opu.citation.lastpage | 289 | en |
opu.citation.issue | 2 | en |
Располагается в коллекциях: | 2020 |
Файлы этого ресурса:
Файл | Описание | Размер | Формат | |
---|---|---|---|---|
1772-Article Text-2716-1-10-20200615.pdf | 329.77 kB | Adobe PDF | Просмотреть/Открыть |
Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.