Volatile FPGA design security – a survey

نویسنده

  • Saar Drimer
چکیده

Volatile FPGAs, the dominant type of programmable logic devices, are used for space, military, automotive, and consumer electronics applications which require them to operate in a wide range of environments. Their continuous growth in both capability and capacity now requires significant resources to be invested in the designs that are created for them. This has brought increased interest in their security attributes; specifically, how well does the FPGA protect the information processed within it, how are FPGA designs protected during distribution, and how developers’ ownership rights are protected while designs from multiple sources are combined. This survey, which assumes very basic logic design and security understanding, establishes the foundations for discussing “FPGA security”, examines a wide range of attacks and defenses along with the current state of industry offerings, and finally, outlines on-going research and latest developments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

FPGA Design Security Solution Using MAX II Devices

This document provides a solution to prevent the FPGA designs from being copied. It allows the FPGA design to remain secure even if the configuration bitstream is captured. This is accomplished by disabling the functionality of the user design within the FPGA until handshaking tokens are passed to the FPGA from the MAX ® II device. The MAX II devices are selected for generating the handshaking ...

متن کامل

Security Analysis of the Bitstream Encryption Scheme of Altera FPGAs

Altera provides custom logic solutions and is, besides Xilinx, one of the biggest vendors in their sector. Altera’s Field Programmable Gate Arrays (FPGAs) are SRAM-based devices and thus volatile, which implies that they load their configuration from a configuration device or a flash memory at each new power-up. The FPGA designs are given in the form of a bitstream. In order to protect such a c...

متن کامل

Security for volatile FPGAs

With reconfigurable devices fast becoming complete systems in their own right, interest in their security properties has increased. While research on " FPGA security " has been active since the early 2000s, few have treated the field as a whole, or framed its challenges in the context of the unique FPGA usage model and application space. This dissertation sets out to examine the role of FPGAs w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007