A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection

computer and communications security(2018)

引用 25|浏览7
暂无评分
摘要
Since FPGAs are field-programmable and reconfigurable integrated circuits, there are many security concerns that malicious functions like hardware Trojans can be infiltrated into circuits not only in development stages but also in deployment stages -- malicious fabrication and modification are possible even after deployment. To detect hardware Trojans effectively, we must be able to deal with the netlists available at development stages and the bitstreams available at deployment stages -- it is highly desired to reverse-engineer the bitstreams to the netlists, but unfortunately greatly challenging. In this poster, we introduce our project aiming at hardware Trojans detection at both stages in FPGAs, and present our bitstream reverse engineering tool called BRET, recently developed for Xilinx Virtex-5 bitstreams. We also discuss the prospective results and directions.
更多
查看译文
关键词
FPGA, Hardware Trojans, Reverse Engineering, Machine learning
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要