2020
DOI: 10.1145/3373638
|View full text |Cite
|
Sign up to set email alerts
|

Tunable FPGA Bitstream Obfuscation with Boolean Satisfiability Attack Countermeasure

Abstract: Field Programmable Gate Arrays (FPGAs) are seeing a surge in usage in many emerging application domains, where the in-field reconfigurability is an attractive characteristic for diverse applications with dynamic design requirements, such as cloud computing, automotive, IoT, and aerospace. The security of the FPGA configuration file, or bitstream , is critical, especially for devices with long in-field lifetimes, where attackers may attempt to extract valuable Intellectual Property (IP) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…In [11,[35][36][37], combinational logic locking schemes dedicated to FPGAs are presented. The basic idea is to insert key bits to the unused inputs of already instantiated LUTs and define the locked logic that corresponds to the wrong values of the key bits by modifying the LUT's truth table.…”
Section: Fpgamentioning
confidence: 99%
“…In [11,[35][36][37], combinational logic locking schemes dedicated to FPGAs are presented. The basic idea is to insert key bits to the unused inputs of already instantiated LUTs and define the locked logic that corresponds to the wrong values of the key bits by modifying the LUT's truth table.…”
Section: Fpgamentioning
confidence: 99%
“…Zhang et al [10] proposed an obfuscation scheme achieved through varying finite field constructions and primitive element representations. A set of quantitatively evaluable metrics are proposed [11], and Olney et al [12] proposed a tunable obfuscation approach from typical bitstream attacks while enabling designers to trade off security with acceptable overhead. Some researchers considered location-based obfuscation: A framework with geo-obfuscation is proposed [13] to protect users' locations during task assignments; A Proactive Topology Obfuscation (ProTO) system that adopts a detect-then-obfuscate framework is proposed [14]; A location obfuscation method [15] is proposed which is robust to privacy inferences by the service provider regarding route source and destination.…”
Section: Related Workmentioning
confidence: 99%
“…This has inspired researchers to develop newer and more sophisticated security protocols, including protocols that are inspired by biology and species diversity. There have been many research endeavors that propose bio-inspired security protocols for the secure deployment of hardware [26,37,59,40] and software [11,4,28], as well as security protocols to protect networks and cyberspace [44,15] and to ensure data privacy and security [22,12]. In general, diversity of a species at the genetic level is necessary for the overall survival of that species.…”
Section: Bio-diversity Inspired Securitymentioning
confidence: 99%
“…For example, given a classiication model for a self driving car, there may be several hundred thousand or even millions of these products in operation, with each one having a similar or identical hardware composition. This has motivated researchers to investigate alternative means of hardware deployment, including mutating or łpatchablež hardware [26,40].…”
Section: Bio-diversity Inspired Securitymentioning
confidence: 99%