A protocol for secure remote updates of FPGA configurations

39Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present a security protocol for the remote update of volatile FPGA configurations stored in non-volatile memory. Our approach can be implemented on existing FPGAs, as it sits entirely in user logic. Our protocol provides for remote attestation of the running configuration and the status of the upload process. It authenticates the uploading party both before initiating the upload and before completing it, to both limit a denial-of-service attack and protect the integrity of the bitstream. Encryption protects bitstream confidentiality in transit; we either decrypt it before non-volatile storage, or pass on ciphertext if the configuration logic can decrypt it. We discuss how tamper-proofing the connection between the FPGA and the non-volatile memory, as well as space for multiple bitstreams in the latter, can improve resilience against downgrading and denial-of-service attacks. © Springer-Verlag Berlin Heidelberg 2009.

Cite

CITATION STYLE

APA

Drimer, S., & Kuhn, M. G. (2009). A protocol for secure remote updates of FPGA configurations. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5453, pp. 50–61). https://doi.org/10.1007/978-3-642-00641-8_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free