首页 | 本学科首页   官方微博 | 高级检索  
     


Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications
Affiliation:1. Department of Electronic Engineering, University of York, – YO10 5DD, UK;2. Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur– 721302, India;1. Department of Mathematics, Faculty of Mathematical Sciences and Computer, Kharazmi University, Tehran, Iran;2. Electrical Engineering Department, Shahid Rajaee Teacher Training University, Tehran 16788-15811, Iran;3. School of Computer Science, Institute for Research in Fundamental Sciences (IPM), Tehran, Iran;4. Swedish Institute of Computer Science, Swedish ICT, Sweden;1. Poznan Supercomputing and Networking Center, ul. Noskowskiego 10, 61-704 Poznan, Poland;2. DEIB – Politecnico di Milano, Piazza Leonardo da Vinci 32, Milano, Italy;3. XLAB d.o.o., Pot za Brdom 100, 1000 Ljubljana, Slovenia;4. Cognitronics and Sensor Systems Group, CITEC, Bielefeld University, Germany;5. christmann informationstechnik + medien GmbH & Co. KG, Ilseder Huette 10c, 31241 Ilsede, Germany;6. CEA, LIST, PC 172, 91191 Gif-sur-Yvette CEDEX, France;7. OFFIS e.V. – Institute for Information Technology, Germany;8. ARM Ltd., CPC-1 Capital Park, Fulbourn, Cambridge CB21 5XE, UK;9. Vodafone Telematics, India;10. CEWE Stiftung & Co. KGaA, Germany;1. Convergence Laboratory, KT R&D Center, 151 Taebong-ro, Seocho-gu, Seoul 06763, Korea;2. Department of Computer Science and Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-gu, Seoul 156-743, Korea;3. Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), 232 Gongneung-ro, Nowon-gu, Seoul, 01811, Korea;1. State Key Laboratory of Integrated Service Networks, Xidian University, Xi''an, China;2. Department of Computer Science, University of Otago, Dunedin, New Zealand;3. Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory, Shijiazhuang 050081, China
Abstract:The advent of the Internet of Things has motivated the use of Field Programmable Gate Array (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities for dynamic non-invasive modifications to circuits implemented on the FPGA. In particular, the ability to perform DPR over the network is essential in the context of a growing number of Internet of Things (IoT)-based and embedded security applications. However, the use of remote DPR brings with it a number of security threats that could lead to potentially catastrophic consequences in practical scenarios. In this paper, we demonstrate four examples where the remote DPR capability of the FPGA may be exploited by an adversary to launch Hardware Trojan Horse (HTH) attacks on commonly used security applications. We substantiate the threat by demonstrating remotely-launched attacks on Xilinx FPGA-based hardware implementations of a cryptographic algorithm, a true random number generator, and two processor based security applications - namely, a software implementation of a cryptographic algorithm and a cash dispensing scheme. The attacks are launched by on-the-fly transfer of malicious FPGA configuration bitstreams over an Ethernet connection to perform DPR and leak sensitive information. Finally, we comment on plausible countermeasures to prevent such attacks.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号