SECURE FPGA CONFIGURATION ARCHITECTURE PREVENTING SYSTEM DOWNGRADE

被引:11
作者
Badrignans, Benoit [1 ,2 ]
Elbaz, Reouven [3 ]
Torres, Lionel [1 ]
机构
[1] Univ Montpellier 2, CNRS, LIRMM UMR, C5506, Montpellier, France
[2] SAS NETHEOS, Montpellier, France
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
来源
2008 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE AND LOGIC APPLICATIONS, VOLS 1 AND 2 | 2008年
关键词
D O I
10.1109/FPL.2008.4629951
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a system designer from fixing security vulnerabilities in a design. Such an attack can be performed over a network when the FPGA-based system is remotely updated or on the bus between the configuration memory and the FPGA chip at power-up. Several security schemes providing encryption and integrity checking of the bitstream have been proposed in the literature. However, as we show in this paper, they do not detect the replay of old FPGA configurations; hence they provide adversaries with the opportunity to downgrade the system. We thus propose a new architecture that, in addition to ensuring bitstream confidentiality and integrity, precludes replay of old bitstreams. We show that the hardware cost of this architecture is negligible.
引用
收藏
页码:317 / +
页数:2
相关论文
共 14 条
[11]  
SCHELLEKENS D, 2008, LECT NOTES COMPUTER
[12]  
SURRATT M, AER C 2005 IEEE
[13]  
*XIL, XIL COMM BROCH LOCK
[14]  
LATTICEXP2 FAMILY HD