Volatile FPGA design security – a survey
نویسنده
چکیده
Volatile FPGAs, the dominant type of programmable logic devices, are used for space, military, automotive, and consumer electronics applications which require them to operate in a wide range of environments. Their continuous growth in both capability and capacity now requires significant resources to be invested in the designs that are created for them. This has brought increased interest in their security attributes; specifically, how well does the FPGA protect the information processed within it, how are FPGA designs protected during distribution, and how developers’ ownership rights are protected while designs from multiple sources are combined. This survey, which assumes very basic logic design and security understanding, establishes the foundations for discussing “FPGA security”, examines a wide range of attacks and defenses along with the current state of industry offerings, and finally, outlines on-going research and latest developments.
منابع مشابه
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملFPGA Design Security Solution Using MAX II Devices
This document provides a solution to prevent the FPGA designs from being copied. It allows the FPGA design to remain secure even if the configuration bitstream is captured. This is accomplished by disabling the functionality of the user design within the FPGA until handshaking tokens are passed to the FPGA from the MAX ® II device. The MAX II devices are selected for generating the handshaking ...
متن کاملSecurity Analysis of the Bitstream Encryption Scheme of Altera FPGAs
Altera provides custom logic solutions and is, besides Xilinx, one of the biggest vendors in their sector. Altera’s Field Programmable Gate Arrays (FPGAs) are SRAM-based devices and thus volatile, which implies that they load their configuration from a configuration device or a flash memory at each new power-up. The FPGA designs are given in the form of a bitstream. In order to protect such a c...
متن کاملSecurity for volatile FPGAs
With reconfigurable devices fast becoming complete systems in their own right, interest in their security properties has increased. While research on " FPGA security " has been active since the early 2000s, few have treated the field as a whole, or framed its challenges in the context of the unique FPGA usage model and application space. This dissertation sets out to examine the role of FPGAs w...
متن کامل