Proceedings of the 24th Asia and South Pacific Design Automation Conference 2019
DOI: 10.1145/3287624.3288742
|View full text |Cite
|
Sign up to set email alerts
|

Insights into the mind of a trojan designer

Abstract: The threat of inserting hardware Trojans during the design, production, or in-field poses a danger for integrated circuits in real-world applications. A particular critical case of hardware Trojans is the malicious manipulation of third-party FPGA configurations. In addition to attack vectors during the design process, FPGAs can be infiltrated in a non-invasive manner after shipment through alterations of the bitstream. First, we present an improved methodology for bitstream file format reversing. Second, we i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…Since Xilinx ISE Design Suite has continued to be widely used to support various types of low cost FPGA chips, reverse engineering using Xilinx ISE Design Suite is as important as using Xilinx Vivado. Since reverse engineering tries to extract the Previously, many studies about reverse engineering [14][15][16][17][18][19][20][21][22][23] have tried to recreate the original design after extracting the bitstream from the external memory while transferring it from a nonvolatile memory. Xilinx supports two integrated development environment-Xilinx ISE Design Suite and Vivado-to synthesize, simulate, and program FPGA chips.…”
Section: Init[0]mentioning
confidence: 99%
See 3 more Smart Citations
“…Since Xilinx ISE Design Suite has continued to be widely used to support various types of low cost FPGA chips, reverse engineering using Xilinx ISE Design Suite is as important as using Xilinx Vivado. Since reverse engineering tries to extract the Previously, many studies about reverse engineering [14][15][16][17][18][19][20][21][22][23] have tried to recreate the original design after extracting the bitstream from the external memory while transferring it from a nonvolatile memory. Xilinx supports two integrated development environment-Xilinx ISE Design Suite and Vivado-to synthesize, simulate, and program FPGA chips.…”
Section: Init[0]mentioning
confidence: 99%
“…More precisely, reverse engineering can detect malicious modification by comparing the regenerated design form bitstream and the original netlist. Many previous researches, including [19,20], have discussed this security issues and concerns.…”
Section: Init[0]mentioning
confidence: 99%
See 2 more Smart Citations
“…Examples of the former include Project X-Ray (SymbiFlow Team, 2019), that focusses on documenting the Xilinx ® 7-Series FPGA architecture to develop a Verilog to bitstream toolchain, and EXTRA, an integrated environment for developing and programming reconfigurable architectures (Ciobanu et al, 2018). Security investigations are mostly centred around injecting malicious bits into the bitstream (Ender et al, 2019;Swierczynski, Becker, Moradi, & Paar, 2018), weakening/breaking bitstream encryption (Celebucki, Graham, & Gunawardena, 2018;Swierczynski, Fyrbiak, Koppe, & Paar, 2015), and extracting the design from the device (Ding, Wu, Zhang, & Zhu, https://doi.org/10.18489/sacj.v31i1.620 2013). An excellent source covering the current state of reverse engineering of FPGA bitstreams, including those from other vendors, can be found in (Yu, Lee, Lee, Kim, & Lee, 2018).…”
Section: Manipulating Fpga Resourcesmentioning
confidence: 99%