Webb, James Braxton2014-03-142014-03-142006-08-29etd-09272006-114810http://hdl.handle.net/10919/35209As Field Programmable Gate Arrays (FPGAs) continue to become integral parts of embedded systems, it is imperative to consider their security. While much of the research in this field is oriented toward the protection of the intellectual property contained in the FPGA's configuration, the protection of the design's integrity from malicious attack against the configuration is critical to the operation of the system. Methods for attacking the configuration are semi-invasive attacks, such as fault injection, and data tampering of incoming partial bitstreams. This thesis introduces methods for securing the integrity of an FPGA's configuration. The design and implementation is discussed for a system that consists of three parts. The first subsystem monitors the running configuration. The second subsystem authenticates partial bistreams that may be used for repairing the configuration from malicious alterations during run-time. The third subsystem indicates if the system itself succumbs to a malicious attack. The system is implemented on-chip, allowing the FPGA to effectively secure itself from attack.In Copyrightauthenticationintegrityfault-injectionembedded systemreconfigurabledynamicpartialsecurityField programmable gate arraysconfigurationconfigurableMethods for Securing the Integrity of FPGA ConfigurationsThesishttp://scholar.lib.vt.edu/theses/available/etd-09272006-114810/