DocumentCode :
1001739
Title :
Security in SRAM FPGAs
Author :
Trimberger, Steve
Author_Institution :
Xilinx Res. Lab., San Jose
Volume :
24
Issue :
6
fYear :
2007
Firstpage :
581
Lastpage :
581
Abstract :
As FPGAs have grown larger and more complex, the value of the IP implemented in them has grown commensurately. Since SRAM FPGAs reload their programming data every time they are powered up, an adversary can potentially copy the program as it is being loaded. FPGA manufacturers have added security features to protect designs from unauthorized copy, theft, and reverse-engineering as the bitstream is transmitted from permanent storage into the FPGA. These bitstream security features use well-known information security methods to protect design data. In this discussion, it is assumed that an adversary has physical access to the FPGA. In this environment, denial-of-service attacks on the configuration are irrelevant: A trivial denial-of-service method would be to physically damage the device - the so-called "whack-it-with-a-hammer" attack.
Keywords :
SRAM chips; cryptography; data privacy; field programmable gate arrays; logic design; SRAM FPGA; bitstream security features; denial-of-service attacks; design confidentiality; information security methods; whack-it-with-a-hammer attack; Computer crime; Cryptography; Data security; Field programmable gate arrays; Information security; Manufacturing; Protection; Random access memory; Secure storage; Testing; FPGAs; bitstream; encryption; reverse-engineering; security;
fLanguage :
English
Journal_Title :
Design & Test of Computers, IEEE
Publisher :
ieee
ISSN :
0740-7475
Type :
jour
DOI :
10.1109/MDT.2007.203
Filename :
4397183
Link To Document :
بازگشت