Leakier wires: exploiting FPGA long wires for covert- and side-channel attacks
In complex FPGA designs, implementations of algorithms and protocols from third-party sources are common. However, the monolithic nature of FPGAs means that all sub-circuits share common on-chip infrastructure, such as routing resources. This presents an attack vector for all FPGAs that contain desi...
Main Authors: | , , |
---|---|
Format: | Journal article |
Published: |
Association for Computing Machinery
2019
|