HowThreats Drive theDevelopment ofSecure Reconfigurable Devices

2008 
SRAM-based FPGAsarebecoming anattractive II.THREATSTORECONFIGURABLE SYSTEMS target technology forthedeployment ofsecure andcryptographic operations. Because ofthis, muchworkhasbeendoneinexposingBefore one a truly apprckiat FPGAs , wemust fi thesecurity vulnerabilities ofreconfigurable computing devices. review thenature ofthose attacking FPGAs,their objectives in Direct probing, side channel, fault injection, andreplay attacksdoing so,andthemethods attheir disposal foraccomplishing areamongthemanythat canbevariously applied tosteal secrettheir objectives. Thissection briefly introduces theclasses of configurations, keys, data, andaccess. Herewereview thethreatsattackers, along withtheir prospective objectives, motivations, facedbyFPGAsandproposeandanalyze security solutions implementable bybothFPGAapplication designers andFPGA andmethods vendors. We alsolookattheparticular caseofconfiguration A Attackers security andusegametheory tomodeltheattacker/defender relationship asa2-person strategic game. Weconsider three classes ofattackers that varyinexpertise, monetary resources, motivation, equipment, andvulnerability tolegal deterrence (1).
    • Correction
    • Cite
    • Save
    • Machine Reading By IdeaReader
    3
    References
    0
    Citations
    NaN
    KQI
    []