Analysis Of Attack Surfaces And Practical Attack Examples In Open Source Fpga Cad Tools

PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021)(2021)

引用 7|浏览1
暂无评分
摘要
FPGAs gain increasing utilization in system prototyping, low-volume products, and obsolete component replacement. Driven by high profits, FPGA deployment is suffering from various attacks, such as reverse engineering bitstream, functionality tampering via hardware Trojans, information leaking through covert channels, and denial-of-service attacks. Typically, the investigation of security threats on FPGA deployment is tied with a specific FPGA chip and its design suite version, either the discovered attacks or the developed countermeasures are not easy to migrate to other FPGAs. Thus, the utilization of open source FPGA CAD tools becomes increasingly attractive. This work analyzes the new attack surfaces on two open source FPGA GAD tools: VTR and Symbiflow. The case studies in this work indicate that practical attacks in open source FPGA computer-aided-design (CAD) tools can be implemented with minor changes on the intermediate files generated by the CAD toolchain.
更多
查看译文
关键词
FPGA, open source CAD tool, place and route, hardware security, hardware Trojan, bitstream
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要