FPGA reverse engineering in Vivado design suite based on X-ray project
- Authors
- Yu, Hoyoung; Lee, Hyung-Min; Shin, Youngjoo; Kim, Youngmin
- Issue Date
- 2019
- Publisher
- IEEE
- Keywords
- FPGA; Reverse engineering; non-invasive attack
- Citation
- 2019 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), pp.239 - 240
- Journal Title
- 2019 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC)
- Start Page
- 239
- End Page
- 240
- URI
- https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/28035
- ISSN
- 2163-9612
- Abstract
- As FPGA demand grows, interest in FPGA security is also increasing. FPGA Reverse Engineering (RE) in the ISE Design Suite environment has been studied extensively, but FPGA RE in the Vivado Design Suite environment has not been practically studied at present. Particularly, there is no research on Programmable Interconnect Points (PIP). Since a method that correlates bitstream and XDL file is not applicable in Vivado environment, it requires complete analysis of FPGA structure and bitstream. So X-ray project Ill is used for structure analysis. In this paper, we analyze PIP bitstream configuration information based on X-ray project and propose PIP RE method in Vivado Design Suite environment based on it. The proposed method can be extended to full FPGA RE in Vivado Design Suite environment through further studies.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > School of Electronic & Electrical Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.