咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Tunable FPGA Bitstream Obfusca... 收藏

Tunable FPGA Bitstream Obfuscation with Boolean Satisfiability Attack Countermeasure

有布尔可满足性攻击反措施的悦耳的 FPGA Bitstream 困惑

作     者:Olney, Brooks Karam, Robert 

作者机构:4202 E Fowler AveENG 030 Tampa FL 33620 USA 

出 版 物:《ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS》 (美国计算机学会电子系统自动化设计汇刊)

年 卷 期:2020年第25卷第2期

页      面:19-19页

核心收录:

学科分类:08[工学] 0835[工学-软件工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Field Programmable Gate Array obfuscation SAT attack removal attack overheads 

摘      要:Field Programmable Gate Arrays (FPGAs) are seeing a surge in usage in many emerging application domains, where the in-field reconfigurability is an attractive characteristic for diverse applications with dynamic design requirements, such as cloud computing, automotive, IoT, and aerospace. The security of the FPGA configuration file, or bitstream, is critical, especially for devices with long in-field lifetimes, where attackers may attempt to extract valuable Intellectual Property (IP) from within. In this article, we propose a tunable obfuscation approach that protects IP from typical bitstream attacks while enabling designers to trade off security with acceptable overhead. We also consider two potential attacks on this protection mechanism: Boolean SAT Attacks on the obfuscation and removal attacks on the protection circuitry. The obfuscation and SAT countermeasure are integrated in a custom CAD framework within a commercial FPGA toolflow and together provide mathematically strong protection against common bitstream attacks. Further, we quantify the difficulty of a removal attack on the protection circuitry through pattern matching and direct bitstream manipulation. The average area, power, and delay overhead for obfuscation with 95% mismatch probability are 18%, 16%, and 8%, respectively, for small combinational circuits, and 1%, 2%, and 5% for larger arithmetic modules.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分