2021
DOI: 10.1007/s41635-021-00122-4
|View full text |Cite
|
Sign up to set email alerts
|

Turning the Table: Using Bitstream Reverse Engineering to Detect FPGA Trojans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…Cheremisinov [53], achieving the same results in less time. In 2020, W. Danesh et al [54] presented a bitstream reverse engineering scheme demonstrated in a Virtex 5 device. The experimental results provided showed that after the database creation, which can take up to 120 hours, the bitstream reverse engineering process takes less than a minute.…”
Section: Bitstream Reverse Engineeringmentioning
confidence: 99%
“…Cheremisinov [53], achieving the same results in less time. In 2020, W. Danesh et al [54] presented a bitstream reverse engineering scheme demonstrated in a Virtex 5 device. The experimental results provided showed that after the database creation, which can take up to 120 hours, the bitstream reverse engineering process takes less than a minute.…”
Section: Bitstream Reverse Engineeringmentioning
confidence: 99%
“…The complete extraction of the bitstream enables the potential for a cloning attack, and tampering with the hardware results in malfunctions, leading to potential damage. Additionally, intelligent reverse engineering [10][11][12][13][14][15][16][17][18][19][20][21] can be utilized to analyze the design of the netlist. When a circuit is attacked, the circuit does not behave as intended, causing serious problems.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, XDL and XDLRC files are essential for securing a database for reverse engineering. Although some reverse-engineering techniques using Vivado have been announced [15][16][17][18][19][20][21], the techniques are very limited and still at a rudimentary level. The reason the latest FPGA reverse-engineering techniques in Vivado are restricted and disturbed is the absence of textual netlist files such as XDLRC and XDL.…”
Section: Introductionmentioning
confidence: 99%
“…In the very same paper the authors claimed the urgent need for tools able to implement such new paradigm. The work most similar to ours is the one proposed in [32] where reverse engineering of the generated configuration bitstream is exploited to extract the layout actually implemented onto the FPGA device. Such ''real'' (possibly infected) layout is then compared with the ''ideal'' layout coming from the design phases to find differences, and thus, to signal the presence of a HTH.…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…Such ''real'' (possibly infected) layout is then compared with the ''ideal'' layout coming from the design phases to find differences, and thus, to signal the presence of a HTH. The big difference between our approach and the one in [32] is that we exploit machine learning to identify these differences while the one in [32] relies on a deep knowledge of the FPGA architecture and bitstream details.…”
Section: Introduction and Related Workmentioning
confidence: 99%