Proceedings of the 9th Workshop on Embedded Systems Security 2014
DOI: 10.1145/2668322.2668323
|View full text |Cite
|
Sign up to set email alerts
|

Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet

Abstract: We describe a novel methodology to exploit the widely used Dynamic Partial Reconfiguration (DPR) support in Field Programmable Gate Arrays (FPGAs) to implant a hardware Trojan in an Advanced Encryption Standard (AES) encryption circuit implemented on a FPGA. The DPR is performed by transferring the required partial configuration bitstream file over an Ethernet connection to the FPGA board, from an attacker's computer which can communicate with the FPGA over a network. The inserted Trojan launches a "fault atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…In [19], the authors have designed a Trojan on a Basys FPGA board which gets triggered depending upon the "content and timing" of the signals. On the other hand, authors in [20] have designed a hardware Trojan which can be deployed on the FPGA via dynamic partial reconfiguration to induce faults in an AES circuitry for differential fault analysis.…”
Section: Destructive Applications Of Rlutmentioning
confidence: 99%
“…In [19], the authors have designed a Trojan on a Basys FPGA board which gets triggered depending upon the "content and timing" of the signals. On the other hand, authors in [20] have designed a hardware Trojan which can be deployed on the FPGA via dynamic partial reconfiguration to induce faults in an AES circuitry for differential fault analysis.…”
Section: Destructive Applications Of Rlutmentioning
confidence: 99%
“…The other important aspect of our target architecture is the management of the data (both DPR and cryptographic) that is transferred to the FPGA via the Ethernet API controller. A popular choice is the open-source Simple Interface for Reconfigurable Computing (SIRC) platform [13,9,10]. SIRC consists of both software and synthesizable hardware components and facilitates the seamless transfer of arbitrary data to an FPGA via high-level C++ API calls.…”
Section: Remote Dpr Enabled Iot Architecturementioning
confidence: 99%
“…The HTH can be remotely triggered using DPR to maliciously alter the working of the cryptographic circuit on the fly, without the need for any dedicated conditional trigger circuit to be present on the FPGA. This reduces the attack overhead, makes the attack model more practical, efficient and challenging to debug and defend against [9,10]. In this paper, we focus on two such instances of remote Trojan insertion that remotely configure the output of the DCM to compromise the security of cryptographic modules:…”
Section: Exploitation Of Dpr For Remote Hth Insertionmentioning
confidence: 99%
See 2 more Smart Citations