22nd International Conference on Field Programmable Logic and Applications (FPL) 2012
DOI: 10.1109/fpl.2012.6339241
|View full text |Cite
|
Sign up to set email alerts
|

SecURe DPR: Secure update preventing replay attacks for dynamic partial reconfiguration

Abstract: International audienceDynamic partial reconfiguration is a growing need for SRAM FPGA-based embedded systems. This feature allows reconfiguring parts of the FPGA while others continue to run. But it may introduce security breaches affecting FPGA configuration. In this paper, a secure protocol to ensure confidentiality, integrity, authenticity and up-to-dateness is described and applied to dynamic partial reconfiguration. Two common threat models are addressed for industrially-driven use cases. The implementati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…In [7][8][9][10] the FPGA designs including a processor to manage Ethernet frames, which greatly increases the overhead of FPGA resources are presented. In [7,9] use as encryption algorithm Output Feedback (OFB) and [8] uses Cipher Feedback (CBC). In [28], algorithms implemented in the FPGA to manage Ethernet frames are used, but no encryption method is used.…”
Section: Comparison With Existing Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…In [7][8][9][10] the FPGA designs including a processor to manage Ethernet frames, which greatly increases the overhead of FPGA resources are presented. In [7,9] use as encryption algorithm Output Feedback (OFB) and [8] uses Cipher Feedback (CBC). In [28], algorithms implemented in the FPGA to manage Ethernet frames are used, but no encryption method is used.…”
Section: Comparison With Existing Schemesmentioning
confidence: 99%
“…In this case, an alternative is to include in the design a module that allows remote communication management. Among others, in [7][8][9][10] to manage Ethernet configuration frames, they propose the use of a microprocessor-based module. This solution has the disadvantage that it is costly in terms of physical resources and power required; furthermore, the complexity of the design increases and the configuration speed decreases.…”
Section: Introductionmentioning
confidence: 99%
“…If some bytes are missing then the above-described postprocessing step [based on Eqs. (8) and (9) and the results from Appendix] must be performed to recover them. If M E B 1,2 is used and the index 14 of K Nr−1 was not recovered then Algorithm 2 must be executed with the tampering function π(g, d, y), but using the above-proposed T-Boxes' content relationship to avoid the masking of this index.…”
Section: Effects Of the Multiplication Elimination Block On The Attackmentioning
confidence: 99%
“…A similar attack can be carried out to the protocol proposed in [8] to defend against bitstream replay attacks. The authors propose the protocol in figure 4 of [8] for securing the partial reconfiguration procedure of a FPGA device.…”
Section: Application Examplesmentioning
confidence: 99%
“…Devic et al present in [4] and [5] a secure protocol and an implementation which offer remote bitstream updates. They foresee countermeasures against replay attacks and bitstream spoofing and provide a solution without the need for external memory.…”
Section: A Remote Reconfiguration Of An Fpgamentioning
confidence: 99%