Physical Damage to the Circuit Overview Based on FPGA
DOI:
https://doi.org/10.62051/ijcsit.v3n3.38Keywords:
FPGA, Hardware Security, Hardware BackdoorAbstract
At present, the main hardware vulnerabilities of FPGA come from the security threats of hardware backdoors. A hardware backdoor is a malicious circuit planted in an FPGA that, if activated, will cause the FPGA to perform unintended functions. The hardware backdoor is composed of trigger and payload. When the condition of the trigger is satisfied, the malicious function will be realized through the payload circuit. Hardware backdoors often result in data errors, functional failures, information leaks, unauthorized access, and even shortened lifetime of FPGAs.
Downloads
References
[1] Broy M. Engineering cyber-physical systems: Challenges and foundations [M]. Complex Systems Design & Management. Springer, Berlin, Heidelberg, 2013: 1-13.
[2] Congmiao L, Srinivasan D, Reindl T. Malware Detection for Cyber Security Enhancement in Smart Grid [C]. Proceedings on International Conference on Emerg. 2018, 2: 30-36.
[3] Total Microprocessor Sales to Edge Slightly Higher in 2020 [EB/OL]. https://www.icinsights.com/news/bulletins/Total-Microprocessor-Sales-To-Edge-Slightly-Higher-In-2020/
[4] The National Strategy to Secure Cyberspace [EB/OL]. https://georgewbush-whitehouse.archives.gov/pcipb/text/
[5] Haizler O. The United States’ cyber warfare history: Implications on modern cyber operational structures and policymaking [J]. Cyber, Intelligence, and Security, 2017, 1(1): 31-45.
[6] Tromparent P. French cyberdefence policy [C]. 2012 4th International Conference on Cyber Conflict (CYCON 2012). IEEE, 2012: 1-12.
[7] Cohen M S, Freilich C D, Siboni G. Israel and cyberspace: Unique threat and response [J]. International Studies Perspectives, 2016, 17(3): 307-321.
[8] Tabansky L. Cyber Power in the changing Middle East [J]. Turkish Policy Quarterly, 2016, 15(1): 107-114.
[9] Chen T M. Stuxnet, the real start of cyber warfare? [Editor's Note] [J]. IEEE Network, 2010, 24(6): 2-3.
[10] Kim A, Wampler B, Goppert J, et al. Cyber attack vulnerabilities analysis for unmanned aerial vehicles [M]. Infotech@ Aerospace 2012. 2012: 2438.
[11] Verble J. The NSA and Edward Snowden: surveillance in the 21st century [J]. Acm Sigcas Computers and Society, 2014, 44(3): 14-20.
[12] Trump Inherits a Secret Cyberwar Against North Korean Missiles [EB/OL]. https://www.nytimes.com/2017/03/04/world/asia/north-korea-missile-program-sabotage.html
[13] Lipp M, Schwarz M, Gruss D, et al. Meltdown: Reading kernel memory from user space [C]. 27th {USENIX} Security Symposium ({USENIX} Security 18). 2018: 973-990.
[14] Kocher P, Horn J, Fogh A, et al. Spectre attacks: Exploiting speculative execution [C]. 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019: 1-19.
[15] Giordani A. How Meltdown and Spectre will impact future processor designs: ADRIAN GIORDANI REPORTS ON RECENT VULNERABILITIES FOUND IN MANY MODERN CPUS[J]. Scientific Computing World, 2018 (159): 14-16.
[16] Hadžić I, Udani S, Smith J M. FPGA viruses [C]. International Workshop on Field Programmable Logic and Applications. Springer, Berlin, Heidelberg, 1999: 291-300.
[17] Beckhoff C, Koch D, Torresen J. Short-circuits on FPGAs caused by partial runtime reconfiguration [C]. 2010 International Conference on Field Programmable Logic and Applications. IEEE, 2010: 596-601.
[18] Savory D C. Power side-channel DAC implementations for Xilinx FPGAs [D]. Brigham Young University - Provo, 2014.
[19] Ziener D, Baueregger F, Teich J. Using the power side channel of FPGAs for communication [C]. 2010 18th IEEE Annual International Symposium on Field- Programmable Custom Computing Machines. IEEE, 2010: 237-244.
[20] Zick K M, Srivastav M, Zhang W, et al. Sensing nanosecond-scale voltage attacks and natural transients in FPGAs [C]. Proceedings of the ACM/SIGDA international symposium on Field programmable gate arrays. 2013: 101-104.
[21] Gnad D R E, Oboril F, Tahoori M B. Voltage drop-based fault attacks on FPGAs using valid bitstreams [C]. 2017 27th International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2017: 1-7.
[22] Krautter J, Gnad D R E, Tahoori M B. FPGAhammer: Remote voltage fault attacks on shared FPGAs, suitable for DFA on AES [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018: 44-68.
[23] La T M, Matas K, Grunchevski N, et al. FPGADefender: Malicious Self-Oscillator Scanning for Xilinx UltraScale+ FPGAs [J]. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 2019, 13(3): 1-31.
[24] Krautter J, Gnad D R E, Tahoori M B. Mitigating electrical-level attacks towards secure multi-tenant FPGAs in the cloud [J]. ACM Transactions on Reconfigurable Technology and Systems (TRETS), 2019, 12(3): 1-26.
[25] Matas K, La T M, Pham K D, et al. Power-hammering through glitch amplification–attacks and mitigation [C]. 2020 IEEE 28th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE, 2020: 65-69.
[26] Domas C. Breaking the x86 ISA [J]. Black Hat, USA, 2017.
[27] Dofferhoff R, Göebel M, Rietveld K, et al. iScanU: A Portable Scanner for Undocumented Instructions on RISC Processors [C]. 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2020: 306-317.
[28] Strupe F, Kumar R. Uncovering Hidden Instructions in Armv8-A Implementations [C]. Workshop on Hardware and Architectural Support for Security and Privacy. 2020.
[29] Zhu J, Song W, Zhu Z, et al. CPU security benchmark [C]. Proceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors. 2018: 8-14.
[30] Li X, Wu Z, Wei Q, et al. Uisfuzz: An efficient fuzzing method for cpu undocumented instruction searching [J]. IEEE Access, 2019, 7: 149224-149236.
[31] Wu J, Cui B, Chen C, et al. A High Efficiency and Accuracy Method for x86 Undocumented Instruction Detection and Classification [C]. International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Springer, Cham, 2021: 295-303.
[32] X. Wei, Y. Diao and Y. L. Wu. “To Detect, Locate, and Mask Hardware Trojans in digital circuits by reverse engineering and functional ECO”. The 21st Asia and South Pacific Design Automation Conference (ASP-DAC), Macao, 2016: 623-630.
[33] C. Bao, D. Forte and A. Srivastava. “On application of one-class SVM to reverse engineering-based hardware Trojan detection”. The Fifteenth International Symposium on Quality Electronic Design, Santa Clara, 2014: 47-54
[34] R. S. Chakraborty, F. Wolff and S. Paul, et al. “MERO: A statistical approach for hardware Trojan detection”. International Workshop on Cryptographic Hardware and Embedded Systems, Lausanne, 2009: 396-410.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







