Analysis of attack surfaces and practical attack examples in open source fpga cad tools
S Sunkavilli, Z Zhang, Q Yu - 2021 22nd International …, 2021 - ieeexplore.ieee.org
FPGAs gain increasing utilization in system prototyping, low-volume products, and obsolete
component replacement. Driven by high profits, FPGA deployment is suffering from various …
component replacement. Driven by high profits, FPGA deployment is suffering from various …
Fast logic function extraction of LUT from bitstream in Xilinx FPGA
S Choi, H Yoo - Electronics, 2020 - mdpi.com
This paper presents a fast method to extract logic functions of look-up tables (LUTs) from a
bitstream in Xilinx FPGAs. In general, FPGAs utilize LUTs as a primary resource to realize a …
bitstream in Xilinx FPGAs. In general, FPGAs utilize LUTs as a primary resource to realize a …
Approaches to Extend FPGA Reverse-Engineering Technology from ISE to Vivado
S Choi, H Yoo - Electronics, 2024 - mdpi.com
SRAM-based FPGA (Field Programmable Logic Arrays) requires external memory since its
internal memory gets erased when power is cut off. The process of transmitting the circuit …
internal memory gets erased when power is cut off. The process of transmitting the circuit …
Runtime Management of Dynamic Dataflows with Partially Reconfigurable Pipelines on FPGAs
K Mätas - 2023 - search.proquest.com
In order to overcome the famous von Neumann bottleneck, FPGAs employ a dataflow model
that processes data through a pipeline of operator modules, akin to an assembly line for …
that processes data through a pipeline of operator modules, akin to an assembly line for …
Determining Confidence in FPGA Bitstream Reverse Engineering Results
RD Williams, ZA Collier, TL Polmateer… - NAECON 2023-IEEE …, 2023 - ieeexplore.ieee.org
Reverse engineering (RE) is a widespread practice within engineering, and it is particularly
relevant for discovering maliciousfunctionality in digital hardware components. In this paper …
relevant for discovering maliciousfunctionality in digital hardware components. In this paper …
Bitstream Configuration
This chapter will introduce the final step of FPGA application design EDA–bitstream
configuration, including bitstream generation, compression, encryption, and programming …
configuration, including bitstream generation, compression, encryption, and programming …
Fast FPGA Reverse Engineering for Hardware Metering and Fingerprinting
A Perumalla, H Stowasser… - NAECON 2023-IEEE …, 2023 - ieeexplore.ieee.org
We describe a fast, abstract method for reverse engineering (RE) field programmable gate
array (FPGA) look-up-tables (LUTs). Our method has direct applications to hardware (HW) …
array (FPGA) look-up-tables (LUTs). Our method has direct applications to hardware (HW) …
[PDF][PDF] Security Problems of Latest FPGAs and Reverse Engineering Methods of Xilinx 7-series FPGAs
Field programmable gate arrays (FPGA) are commonly used in modern electronic
applications, such as home appliances, automobiles, aerospace applications, and Internet …
applications, such as home appliances, automobiles, aerospace applications, and Internet …
Identifying Radiation-Induced Micro-SEFIs in SRAM FPGAs
A Pérez-Celis, C Thurlow… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Field-programmable gate arrays (FPGAs) are susceptible to radiation-induced effects that
can affect more than one memory cell. Radiation-induced microsingle event functional …
can affect more than one memory cell. Radiation-induced microsingle event functional …