利用运动目标防御原理保护FPGA系统安全

Zhiming Zhang, Qiaoyan Yu
{"title":"利用运动目标防御原理保护FPGA系统安全","authors":"Zhiming Zhang, Qiaoyan Yu","doi":"10.1109/ISVLSI.2018.00078","DOIUrl":null,"url":null,"abstract":"Field Programmable Gate Arrays (FPGAs) enter a rapid growth era due to their attractive flexibility and CMOS-compatible fabrication process. However, the increasing popularity and usage of FPGAs also drive more motivated attacks on FPGA systems. In this work, we extensively investigate new potential attacks originated from the untrusted computer-aided design (CAD) suite for FPGAs and further propose a series of countermeasures. For the scenario of using FPGAs to replace obsolete components in legacy systems, we propose a Runtime Pin Grounding (RPG) scheme to ground the unused pins and check the pin status at every clock cycle, and exploit the principle of moving target defense (MTD) to develop a hardware MTD (HMTD) method to thwart hardware Trojan attacks. For general FPGA applications, we extend HMTD to an FPGA-oriented MTD (FOMTD) method, which is composed of three defense lines. FPGA emulation results and hardware cost analyses show that the proposed countermeasures are capable of tackling the attacks from malicious CAD tools with acceptable overheads.","PeriodicalId":114330,"journal":{"name":"2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Exploiting Principle of Moving Target Defense to Secure FPGA Systems\",\"authors\":\"Zhiming Zhang, Qiaoyan Yu\",\"doi\":\"10.1109/ISVLSI.2018.00078\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Field Programmable Gate Arrays (FPGAs) enter a rapid growth era due to their attractive flexibility and CMOS-compatible fabrication process. However, the increasing popularity and usage of FPGAs also drive more motivated attacks on FPGA systems. In this work, we extensively investigate new potential attacks originated from the untrusted computer-aided design (CAD) suite for FPGAs and further propose a series of countermeasures. For the scenario of using FPGAs to replace obsolete components in legacy systems, we propose a Runtime Pin Grounding (RPG) scheme to ground the unused pins and check the pin status at every clock cycle, and exploit the principle of moving target defense (MTD) to develop a hardware MTD (HMTD) method to thwart hardware Trojan attacks. For general FPGA applications, we extend HMTD to an FPGA-oriented MTD (FOMTD) method, which is composed of three defense lines. FPGA emulation results and hardware cost analyses show that the proposed countermeasures are capable of tackling the attacks from malicious CAD tools with acceptable overheads.\",\"PeriodicalId\":114330,\"journal\":{\"name\":\"2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISVLSI.2018.00078\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISVLSI.2018.00078","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

现场可编程门阵列(fpga)由于其具有吸引力的灵活性和与cmos兼容的制造工艺,进入了快速发展的时代。然而,随着FPGA的日益普及和使用,对FPGA系统的攻击也越来越多。在这项工作中,我们广泛研究了来自fpga的不可信计算机辅助设计(CAD)套件的新潜在攻击,并进一步提出了一系列对策。针对使用fpga取代遗留系统中过时组件的场景,我们提出了一种运行时引脚接地(RPG)方案,在每个时钟周期对未使用的引脚进行接地并检查引脚状态,并利用移动目标防御(MTD)原理开发了一种硬件MTD (HMTD)方法来阻止硬件木马攻击。对于一般的FPGA应用,我们将HMTD扩展为面向FPGA的MTD (FOMTD)方法,该方法由三条防线组成。FPGA仿真结果和硬件成本分析表明,所提出的对策能够在可接受的开销范围内解决来自恶意CAD工具的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Exploiting Principle of Moving Target Defense to Secure FPGA Systems
Field Programmable Gate Arrays (FPGAs) enter a rapid growth era due to their attractive flexibility and CMOS-compatible fabrication process. However, the increasing popularity and usage of FPGAs also drive more motivated attacks on FPGA systems. In this work, we extensively investigate new potential attacks originated from the untrusted computer-aided design (CAD) suite for FPGAs and further propose a series of countermeasures. For the scenario of using FPGAs to replace obsolete components in legacy systems, we propose a Runtime Pin Grounding (RPG) scheme to ground the unused pins and check the pin status at every clock cycle, and exploit the principle of moving target defense (MTD) to develop a hardware MTD (HMTD) method to thwart hardware Trojan attacks. For general FPGA applications, we extend HMTD to an FPGA-oriented MTD (FOMTD) method, which is composed of three defense lines. FPGA emulation results and hardware cost analyses show that the proposed countermeasures are capable of tackling the attacks from malicious CAD tools with acceptable overheads.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信