首页> 外文会议>IEEE International Symposium on Hardware Oriented Security and Trust >FPGA-oriented moving target defense against security threats from malicious FPGA tools
【24h】

FPGA-oriented moving target defense against security threats from malicious FPGA tools

机译:面向FPGA的移动目标防御恶意FPGA工具带来的安全威胁

获取原文

摘要

The imbalance relationship between FPGA hardware/software providers and FPGA users challenges the assurance of secure design on FPGAs. Existing efforts on FPGA security primarily focus on reverse engineering the downloaded FPGA configuration, retrieving the authentication code or crypto key stored on the embedded memory in FPGAs, and countermeasures for the security threats above. In this work, we investigate new security threats from malicious FPGA tools, and identify stealthy attacks that could occur during FPGA deployment. To address those attacks, we exploit the principles of moving target defense (MTD) and propose a FPGA-oriented MTD (FOMTD) method. Our method is composed of three defense lines, which are formed by an improved user constraint file, random selection of design replicas, and runtime submodule assembling, respectively. The FPGA emulation results show that the proposed FOMTD method reduces the hardware Trojan hit rate by 60% over the baseline, at the cost of 10.76% more power consumption.
机译:FPGA硬件/软件提供商与FPGA用户之间的不平衡关系对确保FPGA上的安全设计提出了挑战。在FPGA安全性方面的现有工作主要集中在对下载的FPGA配置进行反向工程,检索存储在FPGA的嵌入式存储器中的身份验证代码或加密密钥以及针对上述安全威胁的对策。在这项工作中,我们调查了来自恶意FPGA工具的新安全威胁,并确定了在FPGA部署期间可能发生的隐形攻击。为了解决这些攻击,我们利用了移动目标防御(MTD)的原理,并提出了一种面向FPGA的MTD(FOMTD)方法。我们的方法由三道防线组成,分别由改进的用户约束文件,随机选择设计副本和运行时子模块组装而成。 FPGA仿真结果表明,所提出的FOMTD方法使硬件Trojan命中率比基准降低了60%,而功耗却增加了10.76%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号