dc.contributor.author | San, İsmail | |
dc.contributor.author | Fern, Nicole | |
dc.contributor.author | Koç, Çetin Kaya | |
dc.contributor.author | Cheng, Kwang-Ting (Tim) | |
dc.date.accessioned | 2019-10-18T18:43:39Z | |
dc.date.available | 2019-10-18T18:43:39Z | |
dc.date.issued | 2016 | |
dc.identifier.issn | 1946-1488 | |
dc.identifier.uri | https://dx.doi.org/10.1109/FPL.2016.7577347 | |
dc.identifier.uri | https://hdl.handle.net/11421/10374 | |
dc.description | 26th International Conference on Field-Programmable Logic and Applications (FPL) -- AUG 29-SEP 02, 2016 -- Ecole Polytechnique Federale de Lausanne, Lausanne, SWITZERLAND | en_US |
dc.description | WOS: 000386610400049 | en_US |
dc.description.abstract | Reconfigurable platforms such as FPGAs and CPLDs are used to implement flexible and lightweight embedded systems often using soft-processors and a fixed instruction sequence stored in block memories. The bitstream format is proprietary for most vendors, however, in this work we demonstrate how to identify and extract block memory contents within the bitstream, allowing an adversary to learn and possibly modify the fixed instruction sequence. Manipulating the instruction sequence by inserting a Trojan in the bitstream as opposed to in the RTL code allows an adversary to bypass many verification steps. Moreover, the proposed Trojans only add extra instructions to the sequence to leak secret information, and do not change the original program behavior, making them virtually impossible to detect using functional tests. We present a case study where a Trojan is injected into a MIPS AES encryption program to leak internal state information by adding extra instructions from the available ones without changing the original program behavior. | en_US |
dc.description.sponsorship | Huawei, EcoCloud, Micron, Xilinx, Intel PSG, IBM Zurich Res Labs, Atomic Rules, Algo Logic | en_US |
dc.language.iso | eng | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | International Conference on Field Programmable and Logic Applications | |
dc.relation.isversionof | 10.1109/FPL.2016.7577347 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Security | en_US |
dc.subject | Trojan | en_US |
dc.subject | System-On-Chip | en_US |
dc.subject | Fpga | en_US |
dc.title | Trojans Modifying Soft-Processor Instruction Sequences Embedded in FPGA Bitstreams | en_US |
dc.type | conferenceObject | en_US |
dc.relation.journal | 2016 26th International Conference On Field Programmable Logic and Applications (Fpl) | en_US |
dc.contributor.department | Anadolu Üniversitesi | en_US |
dc.contributor.authorID | Koc, Cetin/0000-0002-2572-9565 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |