Secure Protocol Implementation for Remote Bitstream Update Preventing Replay Attacks on FPGA - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2010

Secure Protocol Implementation for Remote Bitstream Update Preventing Replay Attacks on FPGA

Résumé

Nowadays, there are lot of applications where remote update is an essential service. Indeed, in high volume sale products or space-based systems it is too expensive to retrieve the device in order to update it. Field Programmable Gate Arrays (FPGAs) are able to perform that with success through a network. However, this feature may give rise to security flaw like spoofing and replay attacks. These attacks consist in tampering the update of the hardware configuration or in replaying an old bitstream to downgrade the system. Several security schemes providing encryption and integrity checking of the bitstream have been proposed in the literature. However, they do not detect the replay of old FPGA configurations. Considering FPGA with embedded non-volatile memory, we propose a new protocol ensuring bitstream confidentiality, integrity and preventing old bitstreams replay. This work is the improvement and the implementation of previous presented ideas in order to achieve more flexibility. That is why we insist on the way to manage bitstream versions. We also evaluate the area and performance overhead of the proposed architecture.
Fichier non déposé

Dates et versions

lirmm-00818744 , version 1 (29-04-2013)

Identifiants

Citer

Florian Devic, Lionel Torres, Benoit Badrignans. Secure Protocol Implementation for Remote Bitstream Update Preventing Replay Attacks on FPGA. FPL'10: 20th International Conference on Field Programmable Logic and Applications, Aug 2010, Milano, Italy. pp.179-182, ⟨10.1109/FPL.2010.44⟩. ⟨lirmm-00818744⟩
87 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More