Microelectronics, Volume. 54, Issue 2, 338(2024)

Automatic Fault Injection Analysis Method Against FPGA Bitstreams

LEI Wan1, LIU Dan1, WANG Lihui1, LI Qing1, and YU Jun1,2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    References(21)

    [1] [1] KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems [C] //Advances in Cryptology (CRYPTO'96). Santa Barbara, CA, USA. 1996: 104-113.

    [2] [2] KOCHER P C, JAFFE J, JUN B. Differential power analysis [C] // Proceedings of CRYPTO 1999. Santa Barbara, CA, USA. 2009: 388-397.

    [3] [3] RENAULD M, STANDAERT F X. Algebraic sidechannel attacks [C] // Proceedings of the INSCRYPT 2009. Beijing, China. 2009: 393-410.

    [4] [4] MORADI A, BARENGHI A, KASPER T, et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks [C] // The 18th ACM Conference on Computer and Communications Security. Chicago, IL, USA. 2011: 111-124.

    [5] [5] MORADI A, KASPER M, PAAR C. Black-box sidechannel attacks highlight the importance of countermeasures - an analysis of the Xilinx Virtex-4 and Virtex-5bitstreamencryption mechanism [C] //CT-RSA 2012. San Francisco, CA, USA. 2012: 1-18.

    [6] [6] MORADI A, OSWALD D, PAAR C, et al. Sidechannel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering [C] // FPGA'13,Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays.Monterey, CA, USA. 2013: 91-100.

    [7] [7] SWIERCZYNSKI P, MORADI A, OSWALD D, et al. Physical security evaluation of the bitstream encryption mechanism of Altera Stratix II and Stratix III FPGAs [J]. ACM Transactions on Reconfigurable Technology & Systems, 2015, 7(4): 34.1-34.23.

    [8] [8] MORADI A, SCHNEIDER T. Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6,and 7 series [C] // COSADE 2016. Graz, Austria.2016: 71-87.

    [9] [9] TAJIK S. On the power of optical contactless probing:attacking bitstream encryption of FPGAs [C] //Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Dallas, TX,USA. 2017: 1661-1674.

    [10] [10] TAJIK S, DIETZ E, FROHMANN S, et al. Physical characterization of arbiter PUFs [C] // Cryptographic Hardware and Embedded Systems-CHES 2014.Busan, South Korea. 2014: 493-509.

    [11] [11] LOHRKE H, TAJIK S, KRACHENFELS T, et al.Key extraction using thermal laser stimulation: a case study on Xilinx Ultrascale FPGAs [C] // IACR Transactions on Cryptographic Hardware and Embedded Systems. Amsterdam, The Netherlands.2018: 573-595.

    [12] [12] RAHMAN F, FARAHMANDI F, TEHRANIPOOR M M. An end-to-end bitstream tamper attack against flip-chip FPGAs [EB/OL]. http://eprint.iacr.org,2021.

    [13] [13] TRIMBERGER S, MOORE J, LU W. Authenticated encryption for FPGA bitstreams [C] // ACM/SIGDA 19th Int Symp Field Programmable Gate Arrays.Monterey, CA, USA. 2011: 83-86.

    [14] [14] SWIERCZYNSKI P, BECKER G T, MORADI A, et al. Bitstream fault injections (BiFI) - automated fault attacks against SRAM-based FPGAs [J]. Fortschritte der Physik, 2018, 67(3): 348-360.

    [15] [15] SKOROBOGATOV S, WOODS C. Breakthrough silicon scanning discovers backdoor in military chip[C] // CHES 2012. Berlin, Germany. 2012: 23-40.

    [16] [16] ENDER M, MORADI A, PAAR C. The unpatchable silicon: a full break of the bitstream encryption of Xilinx 7-series FPGAs [C] // USENIX Security 2020.2020: 1803-1819.

    [17] [17] ZHANG F, LOU X X, ZHAO X J, et al. Persistent fault analysis on block ciphers [C] // IACR Transactions on Cryptographic Hardware and Embedded Systems. Amsterdam, The Netherlands.2018: 150-172.

    [18] [18] ZHANG Y R, ZHANG F, YANG B L, et al.Persistent fault injection in FPGA via BRAM modification [C] // 2019 IEEE Conference on Dependable and Secure Computing. Hangzhou, China.2019: 1-6.

    [19] [19] 7 series FPGAs configuration user guide (UG470)[EB/OL]. https://support.xilinx.com/s/article/69473?language=en_US, 2018.

    [20] [20] Command line tools user guide (UG628) [EB/OL].https://www.xilinx.com/content/dam/xilinx/support/documents/sw_manuals/xilinx12_4/devref.pdf, 2012.

    [21] [21] Cryptographic hardware project [EB/OL]. http://www.aoki.ecei.tohoku.ac.jp/crypto/web/cores.html, 2017.

    Tools

    Get Citation

    Copy Citation Text

    LEI Wan, LIU Dan, WANG Lihui, LI Qing, YU Jun. Automatic Fault Injection Analysis Method Against FPGA Bitstreams[J]. Microelectronics, 2024, 54(2): 338

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Aug. 29, 2023

    Accepted: --

    Published Online: Aug. 21, 2024

    The Author Email:

    DOI:10.13911/j.cnki.1004-3365.230333

    Topics