{"title":"How Threats Drive the Development of Secure Reconfigurable Devices","authors":"Jonathan Graf, P. Athanas","doi":"10.1109/NAECON.2008.4806553","DOIUrl":null,"url":null,"abstract":"SRAM-based FPGAs are becoming an attractive target technology for the deployment of secure and cryptographic operations. Because of this, much work has been done in exposing the security vulnerabilities of reconfigurable computing devices. Direct probing, side channel, fault injection, and replay attacks are among the many that can be variously applied to steal secret configurations, keys, data, and access. Here we review the threats faced by FPGAs and propose and analyze security solutions implementable by both FPGA application designers and FPGA vendors. We also look at the particular case of configuration security and use game theory to model the attacker/defender relationship as a 2-person strategic game.","PeriodicalId":254758,"journal":{"name":"2008 IEEE National Aerospace and Electronics Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE National Aerospace and Electronics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2008.4806553","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
SRAM-based FPGAs are becoming an attractive target technology for the deployment of secure and cryptographic operations. Because of this, much work has been done in exposing the security vulnerabilities of reconfigurable computing devices. Direct probing, side channel, fault injection, and replay attacks are among the many that can be variously applied to steal secret configurations, keys, data, and access. Here we review the threats faced by FPGAs and propose and analyze security solutions implementable by both FPGA application designers and FPGA vendors. We also look at the particular case of configuration security and use game theory to model the attacker/defender relationship as a 2-person strategic game.