White Paper
Documents
Document Name | Size | Published | Modified | |
---|---|---|---|---|
It's Easy to Protect Your Embedded System from Theft White Paper
Embedded Systems are increasingly subject to threats of intrusion and theft of the design and the Intellectual Property (IP) associated with the design. The design implementation choice, if it includes advanced Design Security features, can protect the design and its IP from even the most aggressive intrusion or tampering. Microsemi's Flash IGLOO2 FPGAs, and SmartFusion2 SoC FPGAs, have best-in-class Design Security features that protect the system from the theft of valuable/priceless IP, overbuilding, malicious hacking, intrusion or hijacking. This white paper will demonstrate how Microsemi IGLOO2 FPGAs and SmartFusion2 SoC FPGAs and the associated design environment make it easy to protect your IP without the need to become a security 'expert'. It will also illustrate how these Design Security capabilities are typically 'free' due to the innovative architecture, technology and use models that these devices employ.
|
Unknown | 06/26/2013 | 10/18/2017 | |
A Cryptographic Solution for Supply Chain Assurance of Intelligent ICs White Paper
To prevent counterfeiting and other fraudulent activity in the supply chain, ways of confirming an electronic component is as per the order is required. This is particularly true in high-value “intelligent” ICs where there is the most profit to be made. There are solutions to this issue ranging from only buying from approved sources (process solutions) to highly complex system level designs (technology solutions). This paper presents a cryptographic solution to the problem that allows the extension of trusted sites from the chip designer and OEM through the entire supply chain to the delivery of finished goods to the customer. The presented solution is based on Microsemi’s newly introduced SmartFusion®2 System-on-Chip (SoC) FPGAs.
|
Unknown | 06/26/2013 | 06/26/2013 | |
Accelerating System-on-Chip FPGA Design for Complex Embedded Systems White Paper
The system-on-chip FPGA is a new class of device that incorporates both field-programmable gate array (FPGA) and microcontroller subsystem on a single device. As the capabilities of these devices extend to high speed serial and DDR memory interfaces, and high performance FPGA fabric with DSP processing, the architecture within the device requires an advanced tool methodology to simplify the designer's experience and accelerate time-to-market. System Builder accomplishes this by guiding users visually, presenting a high level abstraction for system construction and then generating a "correct by construction" implementation of the selected system components.
|
Unknown | 06/26/2013 | 06/26/2013 | |
Achieving High Performance in Military and Aerospace Applications | 164.71 kB | 11/26/2003 | 11/26/2003 | |
Advantages of the 32-Bit Cortex-M1 Processor in Actel FPGAs White Paper | 1011.64 kB | 05/18/2007 | 08/18/2015 | |
APA750 and A54SX32A LANSCE Neutron Test Report | 716.85 kB | 11/26/2003 | 11/26/2003 | |
AutoWP | 149.11 kB | 05/08/2013 | 05/08/2013 | |
Benefits of SmartHLS Whitepaper | Unknown | 01/04/2021 | 08/17/2021 | |
Built-In Software-Based Calibration Option in Programmable System Chips White Paper | 557.55 kB | 03/10/2008 | 08/05/2015 | |
Competitive Programmable Logic Power Comparison White Paper | 1.08 MB | 04/19/2008 | 04/21/2008 | |
DesignSecurity WP | 188.55 kB | 05/08/2013 | 05/08/2013 | |
Developing Embedded Applications with ARM Cortex-M1 Processors in Actel IGLOO and Fusion FPGAs White Paper | 548.29 kB | 03/09/2009 | 03/09/2009 | |
Developing Safety Critical Applications that Meet IEC 61508 Standards White PaperåÊ
Industrial safety systems encompass complex manufacturing infrastructures and processes with many different levels of identified safety integrity requirements. This session will first provide an overview of numerous safety standards with particular focus on the IEC 61508 Functional Safety of Electrical/ Electronic/Programmable Electronic Safety-related Systems. Associated security concerns, in particular for networked embedded systems, will also be explored. A case study of a deployed Safety Level 3 system will be described. A design and implementation methodology will be used to create redundant, dissimilar processes to dramatically improve reliability. A configurable system-on-chip that includes an embedded ARM® Cortex™-M3 processor and FPGA logic will be used as the target implementation device.
|
Unknown | 06/26/2013 | 06/26/2013 | |
Effects of Neutrons on Programmable Logic | 156.46 kB | 12/02/2002 | 06/21/2013 | |
Enhanced Qualification and Lot Acceptance Procedures | 35.82 kB | 08/26/2005 | 08/26/2005 | |
Flash Based Space Applications | 331.74 kB | 05/29/2013 | 03/26/2015 | |
Flash FPGAs in the Value-Based Market White Paper | 65.41 kB | 01/23/2005 | 01/24/2005 | |
Fusion Technology White Paper | 3.05 MB | 12/07/2005 | 06/26/2015 | |
High-Volume nano FPGAs White Paper | 415.85 kB | 11/11/2008 | 11/11/2008 | |
Implement Secure Boot with a Microsemi IGLOO2 FPGA for Free White Paper
Microsemi IGLOO2 devices have a wide range of differentiated Security features that can implement secure boot capability on an embedded system. A secure boot process is needed to verify that the boot code used to 'bring-up' an embedded system is authorized to run on the target processor. Without such a check the security of the MCU controlled sub-system, and perhaps even the rest of a complete networked system, can be compromised by a malicious intruder. This white paper will educate embedded systems designers of the dangers posed by poor system security and will illustrate how implementing secure boot using Microsemi IGLOO2 devices can dramatically increase the security of any embedded system that might be subject to outside attacks. Additionally, the paper will demonstrate how in most cases the addition of these types of security features can be included for free since the IGLOO2 FPGA will also be used to implement other common embedded system functions in addition to the security functions needed for secure boot.
|
Unknown | 06/26/2013 | 06/26/2013 |