{"title":"fpga rootkits在硬件中隐藏恶意代码","authors":"M. Kucera, M. Vetter","doi":"10.1109/WISES.2007.4408497","DOIUrl":null,"url":null,"abstract":"This paper describes the security implications of FPGAs to the trusted computing base of embedded systems. It gives an overview of different FPGA architectures and discusses the security measures and shortcoming of modern FPGAs. Furthermore it shows how an attacker can exploit this shortcoming and integrate rootkit-like code inside the FPGA. After a discussion on possible countermeasures, description on the different ways a root kit can be deployed into the FPGA is given.","PeriodicalId":319643,"journal":{"name":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","volume":"361 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"FPGA-Rootkits Hiding Malicious Code inside the Hardware\",\"authors\":\"M. Kucera, M. Vetter\",\"doi\":\"10.1109/WISES.2007.4408497\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes the security implications of FPGAs to the trusted computing base of embedded systems. It gives an overview of different FPGA architectures and discusses the security measures and shortcoming of modern FPGAs. Furthermore it shows how an attacker can exploit this shortcoming and integrate rootkit-like code inside the FPGA. After a discussion on possible countermeasures, description on the different ways a root kit can be deployed into the FPGA is given.\",\"PeriodicalId\":319643,\"journal\":{\"name\":\"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems\",\"volume\":\"361 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-06-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WISES.2007.4408497\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 Fifth Workshop on Intelligent Solutions in Embedded Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WISES.2007.4408497","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
FPGA-Rootkits Hiding Malicious Code inside the Hardware
This paper describes the security implications of FPGAs to the trusted computing base of embedded systems. It gives an overview of different FPGA architectures and discusses the security measures and shortcoming of modern FPGAs. Furthermore it shows how an attacker can exploit this shortcoming and integrate rootkit-like code inside the FPGA. After a discussion on possible countermeasures, description on the different ways a root kit can be deployed into the FPGA is given.