Abstract
Many Internet of Things (IoT) applications can potentially benefit from the remote Dynamic Partial Reconfiguration (DPR) capabilities of modern Field Programmable Gate Arrays (FPGAs). Such capabilities enable changes in the circuit mapped on the FPGA, for modification or enhancement of functionality offered by the FPGA without taking it offline, via remote communications over a network. However, the use of remote DPR can result in security threats with catastrophic consequences. In this paper, we design two Hardware Trojan Horse attacks that exploit the remote DPR capability of the FPGA, on an encryption circuit and a true random number generator circuit, respectively. In particular, these attacks target the clock signal management circuitry on the FPGA to disrupt functionality. We substantiate the threat by demonstrating successful remote attacks via transfer of malicious bitstreams to a Virtex-5 FPGA, thereby embedding the HTH. Finally, we propose plausible countermeasures to prevent such attacks.
Original language | English |
---|---|
Title of host publication | 2016 Euromicro Conference on Digital System Design (DSD) |
Editors | Paris Kitsos |
Publisher | IEEE |
Pages | 431-438 |
Number of pages | 8 |
ISBN (Electronic) | 9781509028177 |
ISBN (Print) | 9781509028184 |
DOIs | |
Publication status | Published - 27 Oct 2016 |
Externally published | Yes |
Event | Euromicro Conference on Digital System Design - St. Raphael Hotel, Limassol, Cyprus Duration: 31 Aug 2016 → 2 Sep 2016 http://dsd-seaa2016.cs.ucy.ac.cy/index.php?p=DSD2016 (Link to Conference Website) |
Conference
Conference | Euromicro Conference on Digital System Design |
---|---|
Abbreviated title | DSD |
Country/Territory | Cyprus |
City | Limassol |
Period | 31/08/16 → 2/09/16 |
Internet address |
|