Leakier wires: exploiting FPGA long wires for covert- and side-channel attacks

In complex FPGA designs, implementations of algorithms and protocols from third-party sources are common. However, the monolithic nature of FPGAs means that all sub-circuits share common on-chip infrastructure, such as routing resources. This presents an attack vector for all FPGAs that contain desi...

Full description

Bibliographic Details
Main Authors: Giechaskiel, I, Eguro, K, Rasmussen, KB
Format: Journal article
Published: Association for Computing Machinery 2019