Multi Look-up Table FPGA Reverse Engineering with Bitstream Extraction and Multiple PIP/PLP Matching
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hoyoung Yu | - |
dc.contributor.author | Mannhee Cho | - |
dc.contributor.author | Sangil Lee | - |
dc.contributor.author | 이형민 | - |
dc.contributor.author | Young-Min Kim | - |
dc.date.accessioned | 2022-05-13T00:40:21Z | - |
dc.date.available | 2022-05-13T00:40:21Z | - |
dc.date.created | 2022-05-13 | - |
dc.date.issued | 2021-02 | - |
dc.identifier.issn | 1598-1657 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/27582 | - |
dc.description.abstract | Owing to the recognition of the field-programmable gate array (FPGA) as a key component of Internet of Things (IoT) devices, there has been exponential growth in the demand for FPGAs. Along with this increased demand, FPGA security issues have also drawn significant attention. An attacker can extract bitstream, the configuration data stored in FPGAs, and manipulate it to insert a malicious circuit (e.g., Trojan attack). To prevent such attacks, it is essential to identify their root cause and implement countermeasures. In this study, we target Xilinx FPGAs, which provides two FPGA design software, Integrated Software Environment (ISE) design suite and Vivado design suite, depending on the FPGA family. While FPGA reverse engineering has been studied extensively using ISE, little work has been done on Vivado environment. No research has been conducted on the reverse engineering of programmable interconnect points (PIPs), which is essential for reverse engineering of complete circuit. In this study, we propose an FPGA reverse engineering method using the latest Vivado design suite environment FPGAs to extract complete circuits by combining both logic data from programmable logic points and signal connectivity data from PIPs extracted from the bitstream. We performed reverse engineering of 3-bit adder circuit targeting an ARTIX-7 family chip, using Verilog and Vivado design suite. It was confirmed that the logic recovered from bitstream is identical to the actual 3-bit adder circuit, verifying 100% recovery rate of the proposed reverse engineering method. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | 대한전자공학회 | - |
dc.title | Multi Look-up Table FPGA Reverse Engineering with Bitstream Extraction and Multiple PIP/PLP Matching | - |
dc.title.alternative | Multi Look-up Table FPGA Reverse Engineering with Bitstream Extraction and Multiple PIP/PLP Matching | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Young-Min Kim | - |
dc.identifier.doi | 10.5573/JSTS.2021.21.1.049 | - |
dc.identifier.scopusid | 2-s2.0-85126878644 | - |
dc.identifier.wosid | 000744048300006 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, v.21, no.1, pp.49 - 61 | - |
dc.relation.isPartOf | JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE | - |
dc.citation.title | JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE | - |
dc.citation.volume | 21 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 49 | - |
dc.citation.endPage | 61 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART002686246 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Physics | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Physics, Applied | - |
dc.subject.keywordAuthor | FPGA reverse engineering | - |
dc.subject.keywordAuthor | non-invasive attack | - |
dc.subject.keywordAuthor | bitstream | - |
dc.subject.keywordAuthor | logic extract | - |
dc.subject.keywordAuthor | vivado design suite | - |
dc.subject.keywordAuthor | project X-ray | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.