Abstract

Field-programmable gate arrays (FPGAs) are considered to be a suitable platform for various electronics thanks to high performance and reconfigurable structure, but security concerns for FPGAs should be addressed. Non-invasive attacks on FPGAs may extract configuration files, i.e. bitstream, which is stored in external non-volatile memory, to estimate data or modify it to inject malicious codes. To identify the weakness and provide solutions, researches on FPGA reverse engineering have been conducted. This paper proposes an automated tool for FPGA reverse engineering, targeting Xilinx FPGAs. The tool can extract bitstream from the external memory, identify the device type, and reconstruct the logic programmed in the FPGA based on bitstream analysis.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call