首页> 外文会议>International Symposium on Quality Electronic Design >Analysis of Attack Surfaces and Practical Attack Examples in Open Source FPGA CAD Tools
【24h】

Analysis of Attack Surfaces and Practical Attack Examples in Open Source FPGA CAD Tools

机译:开源FPGA CAD工具中攻击表面和实用攻击示例的分析

获取原文

摘要

FPGAs gain increasing utilization in system prototyping, low-volume products, and obsolete component replacement. Driven by high profits, FPGA deployment is suffering from various attacks, such as reverse engineering bitstream, functionality tampering via hardware Trojans, information leaking through covert channels, and denial-of-service attacks. Typically, the investigation of security threats on FPGA deployment is tied with a specific FPGA chip and its design suite version, either the discovered attacks or the developed countermeasures are not easy to migrate to other FPGAs. Thus, the utilization of open source FPGA CAD tools becomes increasingly attractive. This work analyzes the new attack surfaces on two open source FPGA CAD tools: VTR and Symbiflow. The case studies in this work indicate that practical attacks in open source FPGA computeraided-design (CAD) tools can be implemented with minor changes on the intermediate files generated by the CAD toolchain.
机译:FPGA在系统原型,低批量产品和过时的组件更换中增加利用率。 由高利润驱动,FPGA部署患有各种攻击,例如逆向工程比特流,通过硬件特洛伊木马篡改功能篡改,通过隐蔽频道泄漏的信息,以及拒绝服务攻击。 通常,对FPGA部署的安全威胁的调查与特定的FPGA芯片及其设计套件版本联系在一起,无论是发现的攻击还是开发的对策都不容易迁移到其他FPGA。 因此,开源FPGA CAD工具的利用变得越来越有吸引力。 这项工作分析了两个开源FPGA CAD工具上的新攻击表面:VTR和Symbiflow。 本工作中的案例研究表明,开源FPGA电脑设计(CAD)工具中的实际攻击可以在CAD Toolchain生成的中间文件上进行次要更改。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号