Securing FPGA SoC configurations independent of their manufacturers

Nisha Jacob, J. Wittmann, Johann Heyszl, Robert Hesselbarth, F. Wilde, Michael Pehl, G. Sigl, K. Fischer
{"title":"Securing FPGA SoC configurations independent of their manufacturers","authors":"Nisha Jacob, J. Wittmann, Johann Heyszl, Robert Hesselbarth, F. Wilde, Michael Pehl, G. Sigl, K. Fischer","doi":"10.1109/SOCC.2017.8226019","DOIUrl":null,"url":null,"abstract":"System-on-Chips which include FPGAs are important platforms for critical applications since they provide significant software performance through multi-core CPUs as well as high versatility through integrated FPGAs. Those integrated FP-GAs allow to update the programmable hardware functionality, e.g. to include new communication interfaces or to update cryptographic accelerators during the life-time of devices. Updating software as well as hardware configuration is required for critical applications such as e.g. industrial control devices or vehicles with long life-times. Such updates must be authenticated and possibly encrypted. One way to achieve this is to rely on static FPGA manufacturer-provided cryptography and respective master keys. However, in this contribution, we show how to retrofit Xilinx Zynq FPGAs with an alternative cryptographic accelerator and how to establish device-individual keys using Physical Unclonable Function (PUF) technology. These two key aspects reduce the required trust in manufacturer-provided security features while increasing the security by binding configurations to a specific device.","PeriodicalId":366264,"journal":{"name":"2017 30th IEEE International System-on-Chip Conference (SOCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 30th IEEE International System-on-Chip Conference (SOCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOCC.2017.8226019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

System-on-Chips which include FPGAs are important platforms for critical applications since they provide significant software performance through multi-core CPUs as well as high versatility through integrated FPGAs. Those integrated FP-GAs allow to update the programmable hardware functionality, e.g. to include new communication interfaces or to update cryptographic accelerators during the life-time of devices. Updating software as well as hardware configuration is required for critical applications such as e.g. industrial control devices or vehicles with long life-times. Such updates must be authenticated and possibly encrypted. One way to achieve this is to rely on static FPGA manufacturer-provided cryptography and respective master keys. However, in this contribution, we show how to retrofit Xilinx Zynq FPGAs with an alternative cryptographic accelerator and how to establish device-individual keys using Physical Unclonable Function (PUF) technology. These two key aspects reduce the required trust in manufacturer-provided security features while increasing the security by binding configurations to a specific device.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
确保FPGA SoC配置独立于其制造商
包括fpga在内的片上系统是关键应用的重要平台,因为它们通过多核cpu提供重要的软件性能,并通过集成fpga提供高通用性。这些集成的FP-GAs允许更新可编程硬件功能,例如,在设备的生命周期内包括新的通信接口或更新加密加速器。对于工业控制设备或使用寿命长的车辆等关键应用,需要更新软件和硬件配置。这些更新必须经过身份验证,可能还需要加密。实现这一目标的一种方法是依赖于FPGA制造商提供的静态加密和相应的主密钥。然而,在本贡献中,我们展示了如何使用替代加密加速器改造Xilinx Zynq fpga,以及如何使用物理不可克隆功能(PUF)技术建立设备独立密钥。这两个关键方面降低了对制造商提供的安全特性的信任,同时通过将配置绑定到特定设备来提高安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Content-aware line-based power modeling methodology for image signal processor Power and area evaluation of a fault-tolerant network-on-chip A low-pass continuous-time delta-sigma interface circuit for wideband MEMS gyroscope readout ASIC Lithography hotspot detection: From shallow to deep learning The path to global connectivity — Wireless communication enters the next generation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1