Mutarch: Architectural Diversity For Fpga Device And Ip Security

2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC)(2017)

引用 19|浏览50
暂无评分
摘要
Field Programmable Gate Arrays (FPGAs) are being increasingly deployed in diverse applications including the emerging Internet of Things (IoT), biomedical, and automotive systems. However, security of the FPGA configuration file (i.e. bitstream), especially during in-field reconfiguration, as well as effective safeguards against unauthorized tampering and piracy during operation, are notably lacking. The current practice of bitstreram encryption is only available in high-end FPGAs, incurs unacceptably high overhead for area/energy-constrained devices, and is susceptible to side channel attacks. In this paper, we present a fundamentally different and novel approach to FPGA security that can protect against all major attacks on FPGA, namely, unauthorized in-field reprogramming, piracy of FPGA intellectual property (IP) blocks, and targeted malicious modification of the bitstream. Our approach employs the security through diversity principle to FPGA, which is often used in the software domain. We make each device architecturally different from the others using both physical (static) and logical (time-varying) configuration keys, ensuring that attackers cannot use a priori knowledge about one device to mount an attack on another. It therefore mitigates the economic motivation for attackers to reverse engineering the bitstream and IP. The approach is compatible with modern remote upgrade techniques, and requires only small modifications to existing FPGA tool flows, making it an attractive addition to the FPGA security suite. Our experimental results show that the proposed approach achieves provably high security against tampering and piracy with worstcase 14% latency overhead and 13% area overhead.
更多
查看译文
关键词
architectural diversity,FPGA device,IP security,MUTARCH,field programmable gate arrays,Internet of Things,automotive systems,biomedical systems,diverse applications,IoT,configuration file,in-field reconfiguration,bitstream encryption,unauthorized in-field reprogramming,intellectual property blocks,IP blocks,security through diversity principle,physical configuration keys,logical configuration keys,static keys,time-varying keys,modern remote upgrade techniques
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要