A Survey on FPGA Cybersecurity Design Strategies
Open Access
- 11 March 2023
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Reconfigurable Technology and Systems
- Vol. 16 (2), 1-33
- https://doi.org/10.1145/3561515
Abstract
This paper presents a critical literature review on the security aspects of field programmable gate array (FPGA) devices. FPGA devices present unique challenges to cybersecurity through their reconfigurable nature. This paper also pays special attention to emerging system-on-chip (SoC) FPGA devices that incorporate a hard processing system (HPS) on the same die as the FPGA logic. While this incorporation reduces the need for vulnerable external signals, the HPS in SoC FPGA devices adds a level of complexity that is not present for standalone FPGA devices. This added complexity necessarily hands over the task of securing the device to developers. Even with standard security features in place, the HPS might still have unhindered access to the FPGA logic. A single software flaw could open up a breach that might allow an attacker to extract the FPGA’s configuration data. A robust cybersecurity strategy is thus required for developers. As such, this paper aims to provide the groundwork to build a solid threat-based cybersecurity design strategy that is specially adapted to SoC FPGA devices.Keywords
This publication has 105 references indexed in Scilit:
- Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number GeneratorLecture Notes in Computer Science, 2012
- Black-Box Side-Channel Attacks Highlight the Importance of CountermeasuresLecture Notes in Computer Science, 2012
- Introduction to differential power analysisJournal of Cryptographic Engineering, 2011
- When Clocks Fail: On Critical Paths and Clock FaultsLecture Notes in Computer Science, 2010
- Mutual Information AnalysisLecture Notes in Computer Science, 2008
- Power and Fault Analysis Resistance in Hardware through Dynamic ReconfigurationLecture Notes in Computer Science, 2008
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004
- Partially Reconfigurable Cores for Xilinx VirtexLecture Notes in Computer Science, 2002
- A Runtime Reconfigurable Implementation of the GSAT AlgorithmLecture Notes in Computer Science, 1999
- Reconfigurable architectures: A new vision for optimization problemsPublished by Springer Science and Business Media LLC ,1997