首页> 外文期刊>Microprocessors and microsystems >Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications
【24h】

Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications

机译:远程动态部分重新配置:物联网和嵌入式安全应用程序的威胁

获取原文
获取原文并翻译 | 示例

摘要

The advent of the Internet of Things has motivated the use of Field Programmable Gate Array (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities for dynamic non-invasive modifications to circuits implemented on the FPGA. In particular, the ability to perform DPR over the network is essential in the context of a growing number of Internet of Things (IoT)-based and embedded security applications. However, the use of remote DPR brings with it a number of security threats that could lead to potentially catastrophic consequences in practical scenarios. In this paper, we demonstrate four examples where the remote DPR capability of the FPGA may be exploited by an adversary to launch Hardware Trojan Horse (HTH) attacks on commonly used security applications. We substantiate the threat by demonstrating remotely-launched attacks on Xilinx FPGA-based hardware implementations of a cryptographic algorithm, a true random number generator, and two processor based security applications - namely, a software implementation of a cryptographic algorithm and a cash dispensing scheme. The attacks are launched by on-the-fly transfer of malicious FPGA configuration bitstreams over an Ethernet connection to perform DPR and leak sensitive information. Finally, we comment on plausible countermeasures to prevent such attacks. (C) 2017 Elsevier B.V. All rights reserved.
机译:物联网的出现促使人们使用具有动态部分重配置(DPR)功能的现场可编程门阵列(FPGA)设备,对在FPGA上实现的电路进行动态非侵入式修改。特别是,在基于物联网(IoT)和嵌入式安全应用程序的数量不断增长的情况下,通过网络执行DPR的能力至关重要。但是,使用远程DPR会带来许多安全威胁,在实际情况下可能导致潜在的灾难性后果。在本文中,我们演示了四个示例,对手可能会利用FPGA的远程DPR功能在常用的安全应用程序上发起硬件特洛伊木马(HTH)攻击。通过演示对基于Xilinx FPGA的加密算法,真实随机数生成器和两个基于处理器的安全应用程序的硬件实现进行远程攻击,我们证实了这种威胁,即加密算法的软件实现和现金分配方案。这些攻击是通过在以太网连接上动态传输恶意FPGA配置比特流来发起的,以执行DPR和泄漏敏感信息。最后,我们评论了防止此类攻击的合理对策。 (C)2017 Elsevier B.V.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号