B. Peter-rouget, P. Badrignans, L. Benoit, and . Torres, SecBoot -Lightweight secure boot mechanism for Linux-based embedded systems on FPGAs, 2017.

B. Peter-rouget, P. Badrignans, L. Benoit, and . Torres, FPGA implementation of pattern matching for Industrial Control Systems, IPDPS, 2018.

N. Falliere, L. O. Murchu, and E. Chien, W32.stuxnet dossier, Symantec, 2011.

B. Galloway and G. P. Hancke, Introduction to Industrial Control Networks, IEEE Communications Surveys & Tutorials, 2012.

J. Torres, Vulnerability, Interdependencies and risk analysis of coupled infrastructures : power distribution network and ICT, Electric power, 2013.

B. Zhu, A. Joseph, and S. Sastry, A taxonomy of cyber attacks on scada systems, International Conference on Internet of Things and 4th International Conference on Cyber, 2011.

P. Huitsing, R. Chandia, M. Papa, and S. Shenoi, Attack taxonomies for the modbus protocols, International Journal of Critical Infrastructure Protection, 2008.

Y. Xu, Y. Yang, T. Nanjing, J. Ju, and Q. Wang, Review on Cyber Vulnerabilities of Communication Protocols in Industrial Control Systems, 2017 IEEE Conference on Energy Internet and Energy System Integration, 2017.

Z. Drias, A. Serhrouchni, and O. Vogel, Taxonomy of attacks on Industrial Control protocols, International Conference on Protocol Engineering and International Conference on New Technologies of Distributed Systems, 2015.

P. Kocher, R. Lee, G. Mcgraw, A. Raghunathan, and S. Ravi, Security as a new dimension in embedded system design, Proceedings. 41st Design Automation Conference, 2004.

, Altera Corporation, White Paper -Design Security in Stratix III Devices, 2009.

, Microsemi Corporation, Introduction to Implementing Design Security with Microsemi SmartFusion2 and IGLOO2 FPGAs, 2013.

K. Wilkinson, Using Encryption to Secure a 7 Series FPGA Bitstream, Application Note: 7 Series FPGAs, Xilinx, 2015.

K. Chawla and T. Siddiqua, Mutation Resistant Runtime Code using Kernel Attestation, OS-SEC project, 2009.

S. Drimer and M. Kuhn, A Protocol for Secure Remote Updates of FPGA Configurations, Reconfigurable Computing: Architectures, Tools and Applications, 2009.

, Lattice corporation, LatticeXP2 Family Handbook, 2012.

B. Badrignans, Using FPGAs for security-sensitive applications, 2009.

F. Devic, Securing embedded systems based on FPGA technologies, 2012.

K. Kepa, F. Morgan, K. Kosciuszkiewicz, and T. Surmacz, SeReCon: a secure reconfiguration controller for self-reconfigurable systems, International Journal of Critical Computer-Based Systems, 2010.

, Discretix corporation, Discretix Secure Boot (DxSB)

, Atmel corporation, Safe and Secure Bootloader Implementation, 2006.

J. De-cesare, , 2009.

, Building a Secure System using TrustZone Technology, ARM corporation, 2009.

, Microsemi Corporation, Microsemi secure boot reference design -White Paper, 2014.

T. Kai, X. Xin, and C. Guo, The Secure Boot of Embedded System Based on Mobile Trusted Module, Intelligent System Design and Engineering Application, 2012.

J. R. Moyne and D. M. Tilbury, The Emergence of Industrial Control Networks for Manufacturing Control, Diagnostics, and Safety Data, Proceedings of the IEEE, 2007.

Z. Shi, C. Ma, J. Cote, and B. Wang, Hardware Implementation of Hash Functions, Introduction to Hardware Security and Trust, 2011.

H. Li and C. Miao, Hardware Implementation of Hash Function SHA-512, First International Conference on Innovative Computing, vol.I, 2006.

K. M. Binu and A. I. Neethu, Ternary Content Addressable Memory, International Journal of Recent Trends in Engineering & Research, 2016.

S. Hachana, F. Cuppens, and N. Cuppens-boulahia, Towards a new generation of industrial firewalls: Operational-process aware filtering, 14th Annual Conference on Privacy, Security and Trust (PST), 2016.

S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood, Deep Packet Inspection using Parallel Bloom Filters, IEEE Micro, 2004.

J. Crenne, Sécurité Haut-debit pour les Systèmes Embarqués à base de FPGAs, 2012.

K. Al-khamaiseh and S. Alshagarin, A Survey of String Matching Algorithms, International Journal of Engineering Research and Applications, 2014.

P. Michailidis and K. Margaritis, On-line String Matching Algorithms: Survey and Experimental Results, International Journal of Computer Mathematics, 2001.

D. Knuth, J. Morris, and V. Pratt, Fast pattern matching in strings, SIAM Journal on Computing, 1977.

R. Boyer and J. Moore, A fast string searching algorithm, Communications of the ACM, 1977.

A. Aho and M. Corasick, Efficient string matching: An aid to bibliographic search, Communications of the ACM, 1975.

G. F. Ahmed and N. Khare, Hardware based String Matching Algorithms: A Survey, 2014.

E. Azimi, M. B. Ghaznavi-ghoushchi, and A. M. Rahmani, Implementation of Simple SNORT Processor for Efficient Intrusion Detection Systems, IEEE International Conference on Intelligent Computing and Intelligent Systems, 2009.

E. , Analysis of the Cyber Attack on the Ukrainian Power Grid, Defense Use Case, 2016.

M. T. Rose and D. E. Cass, RFC1006 -ISO Transport Service on top of the TCP, Northrop Research and Technology Center, 1987.

A. Mckenzie, RFC905 -ISO Transport Protocol Specification ISO DP 8073, 1984.

Y. Pouffary and A. Young, RFC2126 -ISO Transport Service on top of TCP (ITOT), 1997.

Z. Feng, S. Qin, X. Huo, P. Pei, Y. Liang et al., Snort improvement on Profinet RT for Industrial Control System Intrusion Detection, 2nd IEEE International Conference on Computer and Communications (ICCC), 2016.

, Courtesy: Control Engineering Mobility, Ethernet and Wireless Study, 2013.

M. Wollschlaeger, T. Sauter, and J. Jasperneite, The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and, 2017.

J. D. Decotignie, A perspective on Ethernet-TCP/IP as a fieldbus, IFAC international conference on fieldbus systems and their application, 2001.

Y. Lai and J. Tai, Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard, International Conference on Network-Based Information Systems, 2007.

B. Sharma and B. Bajaj, Packet Filtering using IP Tables in Linux, International Journal of Computer Science Issues, 2011.

K. Joshi and T. Kashiparekh, Implementing Firewall using IP Tables in Linux, International Journal of Emerging Trends in Science and Technology, 2016.

A. Jones, Netfilter and IPTables: A Structural Examination, 2004.

R. Ajami and A. Dinh, Design a Hardware Network Firewall on FPGA, 24th Canadian Conference on Electrical and Computer, 2011.

A. Kumar, A. Mittal, A. Gupta, and S. Ghosh, Firewall Implementation, CS425: Computer Networks, 2010.

A. Zhiyuan and L. Haiyan, Realization of Buffer Overflow, International Forum on Information Technology and Applications, 2010.

R. Johari and P. Sharma, A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection, International Conference on Communication Systems and Network Technologies, 2012.

M. Khari, P. Sangwan, and . Vaishali, Web-application attacks: A survey, 3rd International Conference on Computing for Sustainable Global Development, 2016.

A. W. Mcmorran, An Introduction to IEC 61970-301 & 61968-11: The Common Information Model, 2007.

V. Schiffer, The Common Industrial Protocol (CIP TM ) and the Family of CIP Networks, ODVA, 2016.

R. Elbaz, L. Torres, G. Sassatelli, P. Guillemin, M. Bardouillet et al., A parallelized way to provide data encryption and integrity checking on a processor-memory bus, Proceedings of the 43rd annual Design Automation Conference, 2006.
URL : https://hal.archives-ouvertes.fr/lirmm-00102783

J. Crenne, R. Vaslin, G. Gogniat, J. Diguet, R. Tessier et al., Configurable Memory Security In Embedded Systems, ACM Transactions on Embedded Computing Systems, 2013.

L. Bossuet, G. Gogniat, and W. Burleson, Dynamically Configurable Security for SRAM FPGA Bitstreams, 2016.
URL : https://hal.archives-ouvertes.fr/hal-00089394

M. Va?sut, Secure and flexible boot with U-Boot bootloader, 2014.

, Gentoo Fundation, Initramfs/Guide, 2016.

, The GNU Privacy Guard, 2015.

, Secure Boot with SecBus

J. Teki and U. , Verified RSA -Boot on ARM target, U-boot Mini Summit, 2013.

C. P. Wedage, Efficient Content Addressable Memory Design Using RAM, International Journal of Electronics and Electrical Engineering, 2016.

K. Al-khamaiseh and S. Alshagarin, A Survey of String Matching Algorithms, Journal of Engineering Research and Applications, 2014.

S. Mocanu, M. Kabir-querrec, J. Thiriet, and E. Savary, Cybersécurité des sous-stations électriques IEC 61850, 2015.

T. J. Williams, The Purdue enterprise reference architecture, Comuters in Industry, vol.24, 1994.

C. Shields, What do we mean by Network Denial of Service ?, 2002.