首页> 外文会议>IEEE VLSI Test Symposium >SeRFI: Secure Remote FPGA Initialization in an Untrusted Environment
【24h】

SeRFI: Secure Remote FPGA Initialization in an Untrusted Environment

机译:SeRFI:在不受信任的环境中进行安全的远程FPGA初始化

获取原文

摘要

The bitstream inside a Field-Programmable Gate Array (FPGA) is often protected using an encryption key, acting as a root of trust and stored inside the FPGA, to defend against bitstream piracy, tampering, overproduction, and static-time reverse engineering. For cost savings and faster production, trusted system designers often rely on an untrusted system assembler to program the encryption key into the FPGA, focusing only the end-user-stage threats. However, providing the secret encryption key to an untrusted entity introduces additional threats, since access to this key can compromise the entire root of trust and breach the encrypted bitstream enabling a multitude of attacks including Trojan insertion, piracy and overproduction. To address this issue, we propose the Secure Remote FPGA Initialization (SeRFI) protocol to transmit the encryption key securely from a trusted system designer into an FPGA in physical possession of an untrusted system assembler. Our protocol eliminates direct key sharing with the untrusted system assembler as well as prevents against adversarial intention of extracting the encryption key during the programming phase where the assembler has physical access to the FPGA.
机译:现场可编程门阵列(FPGA)内的比特流通常使用加密密钥保护,该密钥作为信任的根并存储在FPGA内,以防止比特流盗版,篡改,过度生产和静态逆向工程。为了节省成本和加快生产速度,受信任的系统设计人员通常依靠不受信任的系统汇编程序将加密密钥编程到FPGA中,从而仅关注最终用户阶段的威胁。但是,将秘密加密密钥提供给不受信任的实体会带来其他威胁,因为访问此密钥可能会损害整个信任根并破坏加密的比特流,从而导致多种攻击,包括特洛伊木马插入,盗版和生产过剩。为了解决这个问题,我们提出了安全远程FPGA初始化(SeRFI)协议,以将加密密钥从受信任的系统设计者安全地传输到物理上不受信任的系统组装者的FPGA中。我们的协议消除了与不受信任的系统汇编程序的直接密钥共享,并防止了在汇编程序可以对FPGA进行物理访问的编程阶段中对抗提取加密密钥的对抗意图。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号