A Comprehensive FPGA Reverse Engineering Tool-Chain: From Bitstream to RTL Code
As recently studied, field-programmable gate arrays (FPGAs) suffer from growing Hardware Trojan (HT) attacks, and many techniques, e.g., register-transfer level (RTL) code-based analyzing, have been presented to detect HTs on FPGAs. However, for most of the FPGA end users, they can only obtain bitst...
Main Authors: | Tao Zhang, Jian Wang, Shize Guo, Zhe Chen |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8653869/ |
Similar Items
-
FPGA Bitstream Modification: Attacks and Countermeasures
by: Michail Moraitis
Published: (2023-01-01) -
Recent Advances in FPGA Reverse Engineering
by: Hoyoung Yu, et al.
Published: (2018-10-01) -
Fast Logic Function Extraction of LUT from Bitstream in Xilinx FPGA
by: Soyeon Choi, et al.
Published: (2020-07-01) -
A New Methodology to Manage FPGA Distributed Memory Content via Bitstream for Xilinx ZYNQ Devices
by: Julen Gomez-Cornejo, et al.
Published: (2022-12-01) -
A hardware Trojan attack protection method for CGRCA configuration bitstream
by: Liu Min, et al.
Published: (2019-09-01)