Analysis of attack surfaces and practical attack examples in open source fpga cad tools

S Sunkavilli, Z Zhang, Q Yu - 2021 22nd International …, 2021 - ieeexplore.ieee.org
FPGAs gain increasing utilization in system prototyping, low-volume products, and obsolete
component replacement. Driven by high profits, FPGA deployment is suffering from various …

Fast logic function extraction of LUT from bitstream in Xilinx FPGA

S Choi, H Yoo - Electronics, 2020 - mdpi.com
This paper presents a fast method to extract logic functions of look-up tables (LUTs) from a
bitstream in Xilinx FPGAs. In general, FPGAs utilize LUTs as a primary resource to realize a …

Approaches to Extend FPGA Reverse-Engineering Technology from ISE to Vivado

S Choi, H Yoo - Electronics, 2024 - mdpi.com
SRAM-based FPGA (Field Programmable Logic Arrays) requires external memory since its
internal memory gets erased when power is cut off. The process of transmitting the circuit …

Runtime Management of Dynamic Dataflows with Partially Reconfigurable Pipelines on FPGAs

K Mätas - 2023 - search.proquest.com
In order to overcome the famous von Neumann bottleneck, FPGAs employ a dataflow model
that processes data through a pipeline of operator modules, akin to an assembly line for …

Determining Confidence in FPGA Bitstream Reverse Engineering Results

RD Williams, ZA Collier, TL Polmateer… - NAECON 2023-IEEE …, 2023 - ieeexplore.ieee.org
Reverse engineering (RE) is a widespread practice within engineering, and it is particularly
relevant for discovering maliciousfunctionality in digital hardware components. In this paper …

Bitstream Configuration

K Tu, X Tang, C Yu, L Josipović, Z Chu - FPGA EDA: Design Principles …, 2024 - Springer
This chapter will introduce the final step of FPGA application design EDA–bitstream
configuration, including bitstream generation, compression, encryption, and programming …

Fast FPGA Reverse Engineering for Hardware Metering and Fingerprinting

A Perumalla, H Stowasser… - NAECON 2023-IEEE …, 2023 - ieeexplore.ieee.org
We describe a fast, abstract method for reverse engineering (RE) field programmable gate
array (FPGA) look-up-tables (LUTs). Our method has direct applications to hardware (HW) …

[PDF][PDF] Security Problems of Latest FPGAs and Reverse Engineering Methods of Xilinx 7-series FPGAs

D Lee, S Lee, M Cho, HM Lee, Y Kim - Journal of Semiconductor …, 2023 - journal.auric.kr
Field programmable gate arrays (FPGA) are commonly used in modern electronic
applications, such as home appliances, automobiles, aerospace applications, and Internet …

Identifying Radiation-Induced Micro-SEFIs in SRAM FPGAs

A Pérez-Celis, C Thurlow… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Field-programmable gate arrays (FPGAs) are susceptible to radiation-induced effects that
can affect more than one memory cell. Radiation-induced microsingle event functional …

FPGA EDA

K Tu, X Tang, C Yu, L Josipović, Z Chu - Springer
The electronic design automation (EDA) for field programmable gate array (FPGA) is a
special interdisciplinary study area. EDA software runs throughout the entire life cycle of …