FPGA security becomes an issue because adversaries can reverse engineer FPGA design to steal valuable IP information, obtain decrypted FPGA bitstream by wire-tap, clone FPGAs/IPs and sell them , use replay attack on the previous system version with vulnerabilities, conduct remote side channel attacks without physical access (cloud, data center, SoC), attack hardware by software and software by hardware , insert hardware Trojan as a backdoor , and cause denial of service. This training provides all necessary theoretical and practical know-how to secure modern SoC FPGA-based systems, and help customers not just to understand the concepts but also how to implement and integrate them into their project.
The training starts by introducing the main security threats that may be encountered by application designers when working on FPGA.
The training continues by describing the security building blocks currently provided by the Altera, and the role of each one of them.
FPGA security becomes an issue because adversaries can reverse engineer FPGA design to steal valuable IP information, obtain decrypted FPGA bitstream by wire-tap, clone FPGAs/IPs and sell them , use replay attack on the previous system version with vulnerabilities, conduct remote side channel attacks without physical access (cloud, data center, SoC), attack hardware by software and software by hardware , insert hardware Trojan as a backdoor , and cause denial of service. This training provides all necessary theoretical and practical know-how to secure modern SoC FPGA-based systems, and help customers not just to understand the concepts but also how to implement and integrate them into their project.
The training starts by introducing the main security threats that may be encountered by application designers when working on FPGA.
The training continues by describing the security building blocks currently provided by the Altera, and the role of each one of them.