ACM Distinguished Speakers Program:  talks by and with technology leaders and innovators

FPGA Security: New Frontiers

Speakers: Swarup Bhunia
Topic(s): Computer Systems,Embedded Computer Systems,Security & Information Protection

 


Abstract
Reconfigurable hardware platforms, e.g. Field Programmable Gate Arrays (FPGAs) are being increasingly deployed in diverse applications including the emerging Internet of Things (IoT) edge devices, biomedical, and automotive systems, due to their flexibility and superior energy efficiency compared to traditional software implementations. These powerful computing platforms – used stand-alone or embedded – can provide enabling security solutions for modern systems. At the same time, emerging application space for FPGA increasingly exposes them to many attacks in the field, including bitstream piracy, reverse engineering, side-channel attacks, and tampering. Growing demands of remote field programming of FPGA devices during the life-time of the computing system significantly enhance these vulnerabilities. Existing protection mechanisms that predominantly rely on bitstream encryption suffer from several major deficiencies, e.g. high resource overhead, vulnerability of key leakage during remote upgrade, and side-channel attacks. In this talk, first we will describe various security issues in FPGA and then propose effective countermeasures. We will discuss a promising solution for FPGA bitstream security. The solution relies on the concept of architectural diversity that prevents an attacker from using knowledge about one device to mount attack on another. The approach enables secure remote upgrade and integrates well into the existing FPGA tool flow. Efficient implementation of the solution by leveraging on unused configurable logic resources in FPGA (which we refer to as “FPGA dark silicon”) will be discussed. We will also describe a novel application of embedded FPGA for efficient field-upgradable implementation of diverse security policies in system on chips. We will cover the application mapping algorithms and software to accomplish the proposed protection mechanisms.

 


About this Lecture

Number of Slides: 48
Duration: 60 minutes
Languages Available: English
Last Updated: 09-12-2017
Request this Lecture

To request this particular lecture, please complete this online form.
Request a Tour

To request a tour with this speaker, please complete this online form.


All requests will be sent to ACM headquarters for review.
Featured Speaker


Keith Cheverst
Lancaster University

Get Involved!
Help improve the DSP by nominating a speaker or providing feedback to ACM.