首页> 外文会议>IEEE Computer Society Annual Symposium on VLSI >Exploiting Principle of Moving Target Defense to Secure FPGA Systems
【24h】

Exploiting Principle of Moving Target Defense to Secure FPGA Systems

机译:利用移动目标防御的原则来保护FPGA系统

获取原文

摘要

Field Programmable Gate Arrays (FPGAs) enter a rapid growth era due to their attractive flexibility and CMOS-compatible fabrication process. However, the increasing popularity and usage of FPGAs also drive more motivated attacks on FPGA systems. In this work, we extensively investigate new potential attacks originated from the untrusted computer-aided design (CAD) suite for FPGAs and further propose a series of countermeasures. For the scenario of using FPGAs to replace obsolete components in legacy systems, we propose a Runtime Pin Grounding (RPG) scheme to ground the unused pins and check the pin status at every clock cycle, and exploit the principle of moving target defense (MTD) to develop a hardware MTD (HMTD) method to thwart hardware Trojan attacks. For general FPGA applications, we extend HMTD to an FPGA-oriented MTD (FOMTD) method, which is composed of three defense lines. FPGA emulation results and hardware cost analyses show that the proposed countermeasures are capable of tackling the attacks from malicious CAD tools with acceptable overheads.
机译:现场可编程门阵列(FPGA)进入一个快速增长的时代由于它们有吸引力的灵活性和CMOS兼容制造工艺。然而,FPGA中的日益普及和使用也推动FPGA的系统更主动的攻击。在这项工作中,我们广泛地探讨新的潜在的攻击源于不可信的计算机辅助设计(CAD)套件FPGA和进一步提出了一系列对策。对于使用FPGA的遗留系统,以取代过时的组件的情况下,我们提出了一个运行时引脚接地(RPG)计划到地面未使用的管脚,检查在每个时钟周期的引脚状态,并利用移动目标防御原则(MTD)开发一个硬件MTD(HMTD)方法来阻止硬件木马攻击。对于一般的FPGA应用中,我们扩展HMTD到FPGA为本MTD(FOMTD)方法,它是由三道防线。 FPGA仿真结果和硬件成本分析表明,所提出的对策是能够解决恶意CAD工具可接受的开销中的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号