[Resource Topic] 2019/405: A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware

Welcome to the resource topic for 2019/405

Title:
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware

Authors: Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens

Abstract:

Field-Programmable Gate Arrays or FPGAs are popular platforms for hardware-based attestation. They offer protection against physical and remote attacks by verifying if an embedded processor is running the intended application code. However, since FPGAs are configurable after deployment (thus not tamper-resistant), they are susceptible to attacks, just like microprocessors. Therefore, attesting an electronic system that uses an FPGA should be done by verifying the status of both the software and the hardware, without the availability of a dedicated tamper-resistant hardware module. Inspired by the work of Perito and Tsudik, this paper proposes a partially reconfigurable FPGA architecture and attestation protocol that enable the self-attestation of the FPGA. Through the use of our solution, the FPGA can be used as a trusted hardware module to perform hardware-based attestation of a processor. This way, an entire hardware/software system can be protected against malicious code updates.

ePrint: https://eprint.iacr.org/2019/405

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .