METHOD FOR VERIFYING AN EXECUTION ENVIRONMENT USED FOR EXECUTION OF AT LEAST ONE HARDWARE-APPLICATION PROVIDED BY A CONFIGURABLE HARDWARE MODULE

    公开(公告)号:US20220188418A1

    公开(公告)日:2022-06-16

    申请号:US17438618

    申请日:2020-02-25

    Abstract: A method for verifying an execution environment provided by a configurable hardware module, where the execution environment is used for execution of at least one hardware-application, includes receiving a hardware-application 16. The hardware-application includes configuration data describing an instantiation as a hardware-application component on the configurable hardware module. A received hardware-application is instantiated as the hardware-application component in the execution environment. The execution environment of the configurable hardware module that executes the hardware-application component in the respective execution environment is analyzed by an instantiated hardware-application component. The hardware application component communicates with a characterizing unit providing characterizing parameters for the execution environment of the configurable hardware module. The analyzed execution environment of the configurable hardware module is verified as admissible for execution of the hardware-application component if the analyzed execution environment matches the characterizing parameters provided by the characterizing unit.

    METHOD AND CONFIGURABLE HARDWARE MODULE FOR MONITORING A HARDWARE-APPLICATION

    公开(公告)号:US20220164485A1

    公开(公告)日:2022-05-26

    申请号:US17434872

    申请日:2020-02-26

    Abstract: Incoming and outgoing communication of a hardware-application component is monitored and controlled at runtime of the hardware-application component. In this way, a kind of firewall is provided for ensuring secure and un-altered operation of a hardware-application performing security-critical functionalities on a field-programmable gate array. The hardware-application component may interact with other components directly and/or via an on-chip bus. The monitoring of incoming and/or outgoing communication is particularly advantageous when using third party hardware-applications or software applications, i.e., applications developed by untrusted parties. Another advantage is the possibility of monitoring and controlling all the communication between hardware-applications, hardware- and software applications, hardware-applications and peripherals, IO controllers, etc. It is beneficial especially in case a hardware-application is compromised and tries to compromise the rest of the embedded device, or in case a corrupted software application tries to compromise the associated hardware-application at runtime.

Patent Agency Ranking