Categories

FPGA bitstream security broken

Posted on Tuesday, July 26th, 2011 in documentation, FPGA, security by the machinegeek


Researchers in Germany have released two papers detailing how security of the bitstream on Xilinx FPGAs can be compromised.

The first paper (11 pages) discusses power analysis attacks and extracting keys from Virtex-II devices.

The second (3 pages) describes an analysis of the Virtex 4 and 5 bitstream encryption mechanism.

Via Slashdot.

This entry was posted on Tuesday, July 26th, 2011 at 3:00 pm and is filed under documentation, FPGA, security. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

2 Responses to “FPGA bitstream security broken”

  1. Andy says:

    I think you may have swapped the order of the papers. I believe the Virtex-II Pro breakage was first, and the second paper analyzes portability of that sidechannel attack to the V4/V5.

  2. the machinegeek says:

    Thanks. Switched them back now.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • KH: TPS62200 will get him to under 15uA, a bit better than the 20-30uA he mentioned. I would try the same thing. Switch some resistors in...
  • KH: Yeah, it's an end-user thing. Very few people would spend hundreds of hours on this kind of project and sustain it. It's more or less...
  • Max: Not quite a dinosaur if you've seen Big Hero 6 though... wait. You've watched it with your kids, didn't you? That's cheating...! ;) One of...
  • Edward Mallon: A visiting researcher dropped by our humble basement workshop with questions about the physical skill level students would need if they added one of our...
  • KH: And that looks really expensive... Only browsed the vid though, I'm an dinosaur so I had the sound off too. Nice of him to open-source...