메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
Hoyoung Yu (Kwangwoon University) Mannhee Cho (Hongik University) Sangil Lee (Korea University) Hyung-Min Lee (Korea University) Youngmin Kim (Hongik University)
저널정보
대한전자공학회 JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE Journal of Semiconductor Technology and Science Vol.21 No.1
발행연도
2021.2
수록면
49 - 61 (13page)
DOI
10.5573/JSTS.2021.21.1.049

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
Owing to the recognition of the field-programmable gate array (FPGA) as a key component of Internet of Things (IoT) devices, there has been exponential growth in the demand for FPGAs. Along with this increased demand, FPGA security issues have also drawn significant attention. An attacker can extract bitstream, the configuration data stored in FPGAs, and manipulate it to insert a malicious circuit (e.g., Trojan attack). To prevent such attacks, it is essential to identify their root cause and implement countermeasures. In this study, we target Xilinx FPGAs, which provides two FPGA design software, Integrated Software Environment (ISE) design suite and Vivado design suite, depending on the FPGA family. While FPGA reverse engineering has been studied extensively using ISE, little work has been done on Vivado environment. No research has been conducted on the reverse engineering of programmable interconnect points (PIPs), which is essential for reverse engineering of complete circuit. In this study, we propose an FPGA reverse engineering method using the latest Vivado design suite environment FPGAs to extract complete circuits by combining both logic data from programmable logic points and signal connectivity data from PIPs extracted from the bitstream. We performed reverse engineering of 3-bit adder circuit targeting an ARTIX-7 family chip, using Verilog and Vivado design suite. It was confirmed that the logic recovered from bitstream is identical to the actual 3-bit adder circuit, verifying 100% recovery rate of the proposed reverse engineering method.

목차

Abstract
I. INTRODUCTION
II. BACKGROUND
III. REVERSE ENGINEERING OF XILINX 7-SERIES FPGA
IV. EXPERIMENTS
V. CONCLUSIONS
REFERENCES

참고문헌 (22)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

이 논문과 함께 이용한 논문

최근 본 자료

전체보기

댓글(0)

0