MALICIOUS HARDWARE IN FPGA
Keywords:
FPGA, stack processor, side channelAbstract
A survey of malicious hardware in FPGA is considered. The methods for malicious hardware searching and preventing its loading into FPGA are highlighted as well. A conclusion is made that FPGA is the most-safe device against malicious hardware loading. A stack processor structure is proposed which can be used for monitoring the malicious hardware.
References
Сергієнко А. М. Злонамірено створене апаратне забезпечення / А. М. Сергієнко // Information Technology and Security. – 2012. – № 1. – С. 93 – 100.
Huffmire T., Irvine C., Nguyen T.D., Levin T., Kastner R., Sherwood T. Handbook of FPGA Design Security. – Springer. – 2010. – 177 р.
Security Trends for FPGAs. From Secured to Secure Reconfigurable Systems / Editors: B. Badrignans, G. Gogniat, J. L. Danger, L. Torres, V. Fischer. – Springer, 2011. – 196 p.
Hadzic I., Udani S., Smith J. FPGA viruses // Proceedings of the 9-th Int. Workshop on Field-Programmable Logic and Applications, FPL’99, Glasgow, UK. – 1999. – P. 291 – 300.
Wang X., Tehranipoor M., Plusquellic J. Detecting malicious inclusions in secure hardware: challenges and solutions // Proc. IEEE Workshop on Hardware Oriented Security and Trust, HOST, Anaheim, CA, June, 2008, −2008. –P.15-19.
Trimberger S. Trusted design in FPGAs // Proceedings of the 44-th Design Automation Conference, San Diego, CA, USA, DAC 2007, June 4 – 8, 2007, – P. 1.5 – 1.8.
Molchanov O. Microprocessor Architecture for Serial Port Communications / Sergiyenko A., Orlova M. // Advances in Computer Science for Engineering and Education II. – Springer. – 2019. – P. 238 – 246.