首页> 外文OA文献 >Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications
【2h】

Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications

机译:远程动态部分重新配置:对物联网和嵌入式安全应用程序的威胁

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The advent of the Internet of Things has motivated the use of Field Programmable Gate Array (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities for dynamic non-invasive modifications to circuits implemented on the FPGA. In particular, the ability to perform DPR over the network is essential in the context of a growing number of Internet of Things (IoT)-based and embedded security applications. However, the use of remote DPR brings with it a number of security threats that could lead to potentially catastrophic consequences in practical scenarios. In this paper, we demonstrate four examples where the remote DPR capability of the FPGA may be exploited by an adversary to launch Hardware Trojan Horse (HTH) attacks on commonly used security applications. We substantiate the threat by demonstrating remotely-launched attacks on Xilinx FPGA-based hardware implementations of a cryptographic algorithm, a true random number generator, and two processor-based security applications - namely, a software implementation of a cryptographic algorithm and a cash dispensing scheme. The attacks are launched by on-the-fly transfer of malicious FPGA configuration bitstreams over an Ethernet connection to perform DPR and leak sensitive information. Finally, we comment on plausible countermeasures to prevent such attacks
机译:物联网的出现促使人们使用具有动态部分重配置(DPR)功能的现场可编程门阵列(FPGA)设备,对在FPGA上实现的电路进行动态非侵入式修改。特别是,在基于物联网(IoT)和嵌入式安全应用程序的数量不断增长的情况下,通过网络执行DPR的能力至关重要。但是,使用远程DPR会带来许多安全威胁,在实际情况下可能导致潜在的灾难性后果。在本文中,我们演示了四个示例,对手可能会利用FPGA的远程DPR功能在常用的安全应用程序上发起硬件特洛伊木马(HTH)攻击。通过演示对基于Xilinx FPGA的加密算法,真正的随机数生成器和两个基于处理器的安全应用程序的硬件实现进行远程攻击,我们证实了这种威胁,即,加密算法的软件实现和现金分配方案。这些攻击是通过在以太网连接上动态传输恶意FPGA配置比特流来发起的,以执行DPR和泄漏敏感信息。最后,我们评论了防止此类攻击的合理对策

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号