Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jonathan Graf is active.

Publication


Featured researches published by Jonathan Graf.


field-programmable logic and applications | 2007

Wires on Demand: Run-Time Communication Synthesis for Reconfigurable Computing

Peter M. Athanas; John W. Bowen; Timothy Dunham; Cameron D. Patterson; Justin Rice; Matthew Shelburne; Jorge Surís; Mark B. Bucciero; Jonathan Graf

In systems typified by software defined radio, existing flows for run-time FPGA reconfiguration limit resource efficiency when constructing a variety of datapaths. Our approach allocates a sandbox region in which modules from a library can be flexibly placed and interconnected. An efficient run-time framework makes use of lightweight placement and routing techniques to respond on-demand to application requests. Compile time tools automate the task of adding interface wrappers to modules, insulating the designer from reconfiguration details.


hawaii international conference on system sciences | 2006

Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms

Anthony Mahar; Peter M. Athanas; Stephen D. Craven; Joshua Nathaniel Edmison; Jonathan Graf

Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is one of several architectures attempting to provide hardware enforced software protection. The advantage of the SecSoft architecture is increased software protection without alteration to the fundamental interaction of software, operating systems, and developer tools. This work presents the design, implementation, and performance analysis of a fast, flexible hardware Encryption Management Unit (EMU) for such architectures. The EMU provides selective decryption of software instructions residing in page-sized sections of memory, without modification to the core processor. Results are derived from a FPGA based prototype platform containing different cryptographic routines operating with a standard processor.


national aerospace and electronics conference | 2008

How Threats Drive the Development of Secure Reconfigurable Devices

Jonathan Graf; Peter M. Athanas

SRAM-based FPGAs are becoming an attractive target technology for the deployment of secure and cryptographic operations. Because of this, much work has been done in exposing the security vulnerabilities of reconfigurable computing devices. Direct probing, side channel, fault injection, and replay attacks are among the many that can be variously applied to steal secret configurations, keys, data, and access. Here we review the threats faced by FPGAs and propose and analyze security solutions implementable by both FPGA application designers and FPGA vendors. We also look at the particular case of configuration security and use game theory to model the attacker/defender relationship as a 2-person strategic game.


field-programmable logic and applications | 2004

A Key Management Architecture for Securing Off-Chip Data Transfers

Jonathan Graf; Peter M. Athanas

Data security is becoming ever more important in embedded and portable electronic devices. The sophistication of the malicious techniques used by attackers is amazingly advanced. Defensive measures for protecting a device must be even more sophisticated and robust. This paper presents an architecture that manages cryptographic keys for a secure memory interface on an FPGA. The architecture includes functional units that serve to authenticate a user, create a key with multiple layers of security, and encrypt an external memory interface using that key. Cryptographic methods built into the system include an RSA-related secure key exchange, the Secure Hash Algorithm, a certificate storage system, and the Data Encryption Standard algorithm in counter mode.


national aerospace and electronics conference | 2016

Towards system-level adversary attack surface modeling for microelectronics trust

Jonathan Graf

Models of trust for microelectronic systems are difficult to create due to the large variety of adversarial strategies available. Building on previous work, we present a new adversary model that considers the large heterogeneous attack surface that is realistically available on a diverse microelectronic system. We also present an expanded game theoretic model that permits reasoning about optimal adversarial and defensive strategies across this varied attack surface.


Archive | 2007

Hardware-facilitated secure software execution environment

Mark T. Jones; Peter M. Athanas; Cameron D. Patterson; Joshua Nathaniel Edmison; Anthony Mahar; Benjamin J. Muzal; Barry L. Polakowski; Jonathan Graf


Archive | 2010

***WITHDRAWN APPLICATION AS PER THE LATEST USPTO WITHDRAWN LIST***Hardware-facilitated secure software execution environment

Mark T. Jones; Peter M. Athanas; Cameron D. Patterson; Joshua Nathaniel Edmison; Anthony Mahar; Benjamin J. Muzal; Barry L. Polakowski; Jonathan Graf


Archive | 2012

The Integrity of FPGA Designs: Capabilities Enabled by Unlocking Bitstreams and 3rd-Party IP

Jonathan Graf; Scott Harper; Lee W. Lerner


national aerospace and electronics conference | 2017

Formal enforcement of mission assurance properties in cyber-physical systems

Scott Harper; Jonathan Graf; Michael A. Capone; Justin Eng; Michael Farrell; Lee W. Lerner


Archive | 2008

HowThreats Drive theDevelopment ofSecure Reconfigurable Devices

Jonathan Graf; Peter M. Athanas

Collaboration


Dive into the Jonathan Graf's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lee W. Lerner

Georgia Tech Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge