Design For Security

Increased Design Security Through Programmable and Reconfigurable Devices

Presented by:  Adapticom, Inc.
Revision "E" 02/07/2007

While a wide variety of techniques exist to enhance design security, many incorporate specialized components and circuitry that add cost and increase complexity.  Adapticom seeks to enhance security by more highly integrating designs, utilizing the most secure and advanced programmable and reconfigurable digital, analog, and mixed signal devices.

Recent advances in device integration have allowed the propagation of reconfigurable devices that encompass a wide variety of common board level functions.  The use of such devices has had a significant positive effect on Design For Security (DFS) efforts.  Rather than adding components and complexity to the design, these components reduce design overhead in a surprising number of ways:

Today's reconfigurable devices have progressed well beyond the FPGA and PAL technologies that proliferated during the 1990's and now include mixed signal devices such as the Motorola 56800E core-based family of Hybrid Controllers, which combine the processing power of a DSP and the functionality of a microcontoller inside a compact 64-pin LQFP.  This device features 60 MIPS performance (at 60 MHz), along with 48 KB of on-chip Flash memory and a comprehensive set of peripehrals.  It extends the capabilities of the 56F8322 by adding additional analog-to-digital converter (ADC) inputs, and timer input/output pins and has the following features:

A second device family of note, the Cypress PSoC CY8C27x, contains over 100 reconfigurable analog and digital library components created from 12 fundamental analog and 8 digital blocks.  Each of these PSoC (Programmable System on Chip) devices contain a 24 MHz 8-bit microcontroller unit (MCU); 16 kbytes of flash memory; 256 bytes of SRAM; an 8x8 multiplier with 32-bit accumulator; power and sleep monitoring circuits; and a precision real-time clock.  The largest device in the family, the CY8C27443 (datasheet), contains the following resources:

and can be configured to provide such features as: Since the devices have a defined set of analog and digital resources, that can be configured in many ways the overall device function is determined entirely by its programmable configuration. As a result, there are little or no "clues to function" provided by a visual examination of the PCB. Many devices, including both the Motorola and Cypress parts have security features to prevent configuration readback.  The reconfigurability of the devices allow for a tampering defense through "configuration scrubbing", or the loading of "white" configurations.

Other configurable devices with analog/digital functions:


Other "Design Security" links

... previously addressed by DSP's and microprocessors design security becomes an ...
Additional architectural features in the Eclipse-II FPGA family afford users the highest level of design security, above and beyond that of ASICs. ...
Postings and Rantings on Design Security
... Design security is vital in this age when intellectual property and product development ... Since FPGA designs can be changed at an engineer's desk several times ...
New device capabilities such as the new logic structure and design security technology round out the industry's most advanced FPGA feature set. ...
... OEMs generally don't design security into switches, most of the routers, storage ... and private key algorithm processing, while a single FPGA performs algorithm ...
Additionally, the device integrates the company's FlashLock on-chip security feature that promises levels of design security beyond ...
.. memory resources, fast 18x18 multipliers, precision clock management, adaptive digitally controlled I/O termination, and design security. ...
Axcelerator FPGAs Axcelerator offers high performance and unprecedented design security at densities of up ...
May 19, 2003, Article: Design Security in FPGAs, Article: "Rhines predicts FPGA vendors will rule platform roost" - EE Times, ...
Design Security in Stratix II Devices
Xcell Journal Online -- Is Your FPGA Design Secure? article
Website addresses FPGA design security
Oracle design security from the ground up - Builder.com
Secured by Design
Web design security concerns
Design Security. Overview. Many systems consist of an FPGA or ASIC....
Design negotiation policies. Design security policies. Design IP filters. Define security levels. ...
Network Security Architecture Design :: Security Services ...
Course 2830: Designing Security for Microsoft Networks ... Analyze security risks. Design security for physical resources. ... After completing this module, you will be able to design security for physical resources. ...
The Common Man's Guide to Operating System Design: Security
Design Security in FPGAs Special Structured ASIC Section Design Security in FPGAs by ...
Building Security through Design - Security Design ...
Project Design--Security and Access
Design Security in Nonvolatile Flash and Antifuse FPGAs
Design Security Hardware Software - Software, Hardware, Services ...
Wireless Network Design Security Solutions.
White Paper FPGA Design Security Issues: Using the ispXPGA Family ...

Comments to:

http://www.adapticom1.net/mailto




Glossary of terms - Memory Foam Beds

Airdream replacement Airbed mattresses

Home | Design For Security | FuelCellElectronics.com | Trace Tools | Best Blow Dryer | Engineering Services | Estate Alarms | FPGA Security | New Product Development | 802.11b Report | VoIP | links | C. McCord Reference Page


Adapticom, Inc. © Copyright 2003, All Rights Reserved Worldwide.

Other Design For Security Links:

High-Confidence Design for Security - Shiu-Kai (ResearchIndex)

Network design for security concerns

SQL Server: Design for security from the start - Builder.com

Design for Security

Design for Security

High-confidence design for security

Interaction Design for End-User Security

Developing a Performance-based Approach for Security-related ...

Helpful links - Design For Security - Computer Consulting - Best ...

SQL Server: Design for security from the start: ZDNet Australia ...

Secure SQL Server: Installing for security - Builder.com

Internet Security Systems, Inc.

Design For Security - Increased Design Security Through ...

Design For Security - Increased Design Security Through ...

High-Confidence Design for Security - Shiu-Kai (ResearchIndex)

SQL Server: Design for security from the start - Builder.com

Network design for security concerns

SQL Server: Design for security from the start: ZDNet Australia ...

High-confidence design for security

Design for security (in VSCCAT)

[VPN] Network Design for security.

[VPN] Network Design for security.

Design for Security

Design for Security

[PDF] A Revolutionary New Design For Security Screening

Microsoft revamps software design for security

Citations: Design for Security: Second Edition - Healy ...

Design For Security Up Front

Index of /design-for-security

[PDF] An Award-Winning* Wireless Design for Security, Fire Detection ...



High-Confidence Design for Security - Shiu-Kai (ResearchIndex)

Design for Security Draft NPRM

Design for security to keep the enemy at bay

[VPN] Network Design for security.

Re: [VPN] Network Design for security.

Design for security up front - TechUpdate - ZDNet

Developing a Performance-based Approach for Security-related ...

Interaction Design for End-User Security

Design for Security

Design for Security