FPGA Bitstream Modification: Attacks and Countermeasures

Advances in Field-Programmable Gate Array (FPGA) technology in recent years have resulted in an expansion of its usage in a very wide spectrum of applications. Apart from serving the traditional prototyping purposes, FPGAs are currently regarded as an integral part of embedded systems used in many i...

Full description

Bibliographic Details
Main Author: Michail Moraitis
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10313264/
_version_ 1797545228711755776
author Michail Moraitis
author_facet Michail Moraitis
author_sort Michail Moraitis
collection DOAJ
description Advances in Field-Programmable Gate Array (FPGA) technology in recent years have resulted in an expansion of its usage in a very wide spectrum of applications. Apart from serving the traditional prototyping purposes, FPGAs are currently regarded as an integral part of embedded systems used in many industries, including communication, medical, aerospace, automotive, and military. Moreover, the emerging trend of AI has found FPGAs to be at the technological forefront with their use as deep learning acceleration platforms. The demand for FPGAs has grown to the point that major companies (e.g. Amazon) are offering cloud-based access to FPGAs, known as FPGA-as-a-Service. In many applications, FPGAs handle sensitive data and/or host cryptographic algorithm implementations. These FPGAs are not always located in a tamper-resistant environment, which makes their security a major concern, especially in light of the ever-growing number of publications demonstrating effective attacks specifically tailored to exploit the physical traits of FPGA implementations. In this survey, we cover the subset of those attacks that involve tampering with the FPGA configuration bitstream. We start by discussing how the FPGA vendors attempt to protect their products and how malicious parties try to overcome this protection. We then proceed to present the different bitstream modification attacks that can be found in the literature organized according to their targets. Finally, we present various countermeasures that can be deployed, drawing on bibliographic references from works specifically focused on FPGA bitstream protection, as well as those initially proposed for different purposes or devices that can be adapted for bitstream protection.
first_indexed 2024-03-10T14:12:31Z
format Article
id doaj.art-43f2f155cc524e94977cbad875856a85
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-10T14:12:31Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-43f2f155cc524e94977cbad875856a852023-11-21T00:01:11ZengIEEEIEEE Access2169-35362023-01-011112793112795510.1109/ACCESS.2023.333150710313264FPGA Bitstream Modification: Attacks and CountermeasuresMichail Moraitis0https://orcid.org/0000-0002-0278-5986KTH Royal Institute of Technology, Stockholm, SwedenAdvances in Field-Programmable Gate Array (FPGA) technology in recent years have resulted in an expansion of its usage in a very wide spectrum of applications. Apart from serving the traditional prototyping purposes, FPGAs are currently regarded as an integral part of embedded systems used in many industries, including communication, medical, aerospace, automotive, and military. Moreover, the emerging trend of AI has found FPGAs to be at the technological forefront with their use as deep learning acceleration platforms. The demand for FPGAs has grown to the point that major companies (e.g. Amazon) are offering cloud-based access to FPGAs, known as FPGA-as-a-Service. In many applications, FPGAs handle sensitive data and/or host cryptographic algorithm implementations. These FPGAs are not always located in a tamper-resistant environment, which makes their security a major concern, especially in light of the ever-growing number of publications demonstrating effective attacks specifically tailored to exploit the physical traits of FPGA implementations. In this survey, we cover the subset of those attacks that involve tampering with the FPGA configuration bitstream. We start by discussing how the FPGA vendors attempt to protect their products and how malicious parties try to overcome this protection. We then proceed to present the different bitstream modification attacks that can be found in the literature organized according to their targets. Finally, we present various countermeasures that can be deployed, drawing on bibliographic references from works specifically focused on FPGA bitstream protection, as well as those initially proposed for different purposes or devices that can be adapted for bitstream protection.https://ieeexplore.ieee.org/document/10313264/Physical securityreverse engineeringcryptographic implementationFPGAbitstream encryptionbitstream modification
spellingShingle Michail Moraitis
FPGA Bitstream Modification: Attacks and Countermeasures
IEEE Access
Physical security
reverse engineering
cryptographic implementation
FPGA
bitstream encryption
bitstream modification
title FPGA Bitstream Modification: Attacks and Countermeasures
title_full FPGA Bitstream Modification: Attacks and Countermeasures
title_fullStr FPGA Bitstream Modification: Attacks and Countermeasures
title_full_unstemmed FPGA Bitstream Modification: Attacks and Countermeasures
title_short FPGA Bitstream Modification: Attacks and Countermeasures
title_sort fpga bitstream modification attacks and countermeasures
topic Physical security
reverse engineering
cryptographic implementation
FPGA
bitstream encryption
bitstream modification
url https://ieeexplore.ieee.org/document/10313264/
work_keys_str_mv AT michailmoraitis fpgabitstreammodificationattacksandcountermeasures