SECURE FPGA CONFIGURATION ARCHITECTURE PREVENTING SYSTEM DOWNGRADE

被引:11
作者
Badrignans, Benoit [1 ,2 ]
Elbaz, Reouven [3 ]
Torres, Lionel [1 ]
机构
[1] Univ Montpellier 2, CNRS, LIRMM UMR, C5506, Montpellier, France
[2] SAS NETHEOS, Montpellier, France
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
来源
2008 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE AND LOGIC APPLICATIONS, VOLS 1 AND 2 | 2008年
关键词
D O I
10.1109/FPL.2008.4629951
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a system designer from fixing security vulnerabilities in a design. Such an attack can be performed over a network when the FPGA-based system is remotely updated or on the bus between the configuration memory and the FPGA chip at power-up. Several security schemes providing encryption and integrity checking of the bitstream have been proposed in the literature. However, as we show in this paper, they do not detect the replay of old FPGA configurations; hence they provide adversaries with the opportunity to downgrade the system. We thus propose a new architecture that, in addition to ensuring bitstream confidentiality and integrity, precludes replay of old bitstreams. We show that the hardware cost of this architecture is negligible.
引用
收藏
页码:317 / +
页数:2
相关论文
共 14 条
[1]  
*ACT, ACT PROASIC3 HDB
[2]  
*ALT WHIT, DES SEC STRAT 3 DEV
[3]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[4]  
BOSSUET L, 2004, P 11 IEEE REC ARCH W
[5]  
DRIMER S, VOLATILE FPGA DESIGN
[6]  
DRIMER S, 2007, P INT WORKSH APPL RE
[7]  
Eisenbarth T, 2007, STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, P15
[8]  
LESEA A, 2007, IP SECURITY FPGA WHI
[9]  
NOTE JB, 2008, INT S FIELD PROGR GA
[10]   Implementation of EAX mode of operation for FPGA bitstream encryption and authentication [J].
Parelkar, MM ;
Gaj, K .
FPT 05: 2005 IEEE International Conference on Field Programmable Technology, Proceedings, 2005, :335-336