Abstract
To enhance system integrity of FPGA-based embedded systems on hardware design and data communication, we propose a hardware security scheme for nonvolatile resistive random access memory (RRAM) based FPGA, in which internal block RAM (BRAMs) are used for configuration and temporary data storage. The proposed scheme loads obfuscated configurations into nonvolatile BRAMs to protect design data from physical attacks and utilizes Chip DNA to enable design functionality. Moreover, in order to support run-time and remote reconfiguration even in public and insecure environment, we propose a encrypted addressing to secure communication ports with encrypted address.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abraham, D., Dolan, G., Double, G., Stevens, J.: Transaction security system. IBM Syst. J. 30(2), 206–229 (1991)
Altera: Logic Array Blocks and Adaptive Logic Modules in Stratix V Devices (2011). http://www.altera.com
Badrignans, B., Danger, J., Fischer, V., Gogniat, G., Torres, L.: Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems. Springer (2011)
Bottom Line Technlogy: Reverse Engineering/Re-Engineering Services (2011). http://www.bltinc.com
Chen, Y., Zhao, J., Xie, Y.: 3D-NonFAR: three-dimensional non-volatile FPGA architecture using phase change memory. In: International Symposium on Low Power Electronics and Design (ISLPED), pp. 55–60 (2010)
Chen, Y.C., Wang, W., Li, H., Zhang, W.: Non-volatile 3D stacking RRAM-based FPGA. In: International Conference on Field Programmable Logic and Applications (FPL), pp. 367–372 (2012a)
Chen, Y.C., Wang, W., Zhang, W., Li, H.: uBRAM-based run-time reconfigurable FPGA and corresponding reconfiguration methodology. In: International Conference on Field-Programmable Technology (FPT), pp. 80–86 (2012b)
Devic, F., Torres, L., Badrignans, B.: Secure protocol implementation for remote bitstream update preventing replay attacks on FPGA. In: IEEE International Conference on Field Programmable Logic and Applications (FPL), pp. 179–182 (2010)
Dimou, K., Wang, M., Yang, Y., Kazmi, M., Larmo, A., Pettersson, J., Muller, W., Timner, Y.: Handover within 3gpp lte: design principles and performance. In: 2009 IEEE Vehicular Technology Conference Fall (VTC), pp. 1–5 (2009)
Drimer, S., Kuhn, M.G.: A protocol for secure remote updates of FPGA configurations. In: International Workshop on Applied Reconfigurable Computing, pp. 50–61 (2009)
Dworkin, M.: Recommendation for Block Cipher Modes of Operation. Technical report, DTIC Document (2001)
Huffmire, T., Brotherton, B., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., Irvine, C.: Managing security in FPGA-based embedded systems. IEEE Des. Test Comput. 25(6), 590–598 (2008)
Huffmire, T., Irvine, C., Nguyen, T., Levin, T., Kastner, R., Sherwood, T.: Handbook of FPGA Design Security. Springer (2010)
ITRS: International Technology Roadmap for Semiconductors 2011 Edition (2011). http://www.itrs.net/
Karam, R., Liu, R., Chen, P.Y., Yu, S., Bhunia, S.: Security primitive design with nanoscale devices: a case study with resistive RAM. In: ACM Great Lakes Symposium on VLSI (GLVLSI), pp. 299–304 (2016)
Knoth, S.: Supercaps Can Be a Good Choice Over Batteries for Backup Applications (2012). http://www.eetimes.com/document.asp?doc_id=1280982
Kumar, S.S., Guajardo, J., Maes, R., Schrijen, G.J., Tuyls, P.: The butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), pp. 67–70 (2008)
Kuon, I., Tessier, R., Rose, J.: Fpga architecture: survey and challenges. Found. Trends Electron. Des. Autom. 2(2), 135–253 (2008)
Lattice: FPGA Design Security Issues: Using the ispXPGA Family of FPGAs to Achieve High Design Security (2003). http://www.latticesemi.com
Liauw, Y., Zhang, Z., Kim, W., Gamal, A., Wong, S.: Nonvolatile 3D-FPGA with monolithically stacked RRAM-based configuration memory. In: IEEE International Solid-State Circuits Conference Digest of Technical Papers (ISSCC), pp. 406–408 (2012)
Microsemi: Axcelerator Family FPGAs (2012a). http://www.actel.com
Microsemi: IGLOO Low Power Flash FPGAs (2012b). http://www.actel.com
Microsemi: Introduction to the SmartFusion2 and IGLOO2 Security Model (2013a). http://www.microsemi.com
Microsemi: Overview of Data Security Using Microsemi FPGAs and SoC FPGAs (2013b). http://www.microsemi.com
Minkovich, K.: MCNC benchmark (2007). http://cadlab.cs.ucla.edu/~kirill/
Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M.: Report on the Development of the Advanced Encryption Standard (AES). Technical report, DTIC Document (2000)
Paul, S., Mukhopadhyay, S., Bhunia, S.: A circuit and architecture codesign approach for a hybrid CMOS-STTRAM nonvolatile FPGA. IEEE Trans. Nanotechnol. (TNANO) 10(3), 385–394 (2011)
Potkonjak, M., Goudar, V.: Public physical unclonable functions. Proc. IEEE 102(8), 1142–1156 (2014)
Rose, G.S., Rajendran, J., McDonald, N., Karri, R., Potkonjak, M., Wysocki, B.: Hardware security strategies exploiting nanoelectronic circuits. In: IEEE Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 368–372 (2013)
Suh, G., Clarke, D., Gasend, B., Van Dijk, M., Devadas, S.: Efficient memory integrity verification and encryption for secure processors. In: Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), pp. 339–350 (2003)
Wang, Y., Wen, W., Li, H., Hu, M.: A novel true random number generator design leveraging emerging memristor technology. In: ACM Great Lakes Symposium on VLSI (GLVLSI), pp. 271–276 (2015)
Xilinx: 7 Series FPGAs Overview (2011a). http://www.xilinx.com
Xilinx: Partial Reconfiguration of Xilinx FPGAs Using ISE Design Suite (2011b). http://www.xilinx.com
Xilinx: Virtex-5 FPGA Configuration User Guide (2012). http://www.xilinx.com
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Chen, YC., Wang, Y., Zhang, W., Chen, Y., (Helen) Li, H. (2017). In-place Logic Obfuscation for Emerging Nonvolatile FPGAs. In: Bhunia, S., Ray, S., Sur-Kolay, S. (eds) Fundamentals of IP and SoC Security. Springer, Cham. https://doi.org/10.1007/978-3-319-50057-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-50057-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-50055-3
Online ISBN: 978-3-319-50057-7
eBook Packages: EngineeringEngineering (R0)