The security of FPGAs is a crucial topic, as any vulnerability within the hardware can have severe consequences, if they are used in a secure design. Since FPGA designs are encoded in a bitstream, securing the bitstream is of the utmost importance. Adversaries have many motivations to recover and manipulate the bitstream, including design cloning, IP theft, manipulation of the design, or design subversions e.g., through hardware Trojans. Given that FPGAs are often part of cyber-physical systems e.g., in aviation, medical, or industrial devices, this can even lead to physical harm. Consequently, vendors have introduced bitstream encryption, offering authenticity and confidentiality. Even though attacks against bitstream encryption have been proposed in the past, e.g., side-channel analysis and probing, these attacks require sophisticated equipment and considerable technical expertise. In this paper, we introduce novel low-cost attacks against the Xilinx 7-Series (and Virtex-6) bitstream encryption, resulting in the total loss of authenticity and confidentiality. We exploit a design flaw which piecewise leaks the decrypted bitstream. In the attack, the FPGA is used as a decryption oracle, while only access to a configuration interface is needed. The attack does not require any sophisticated tools and, depending on the target system, can potentially be launched remotely. In addition to the attacks, we discuss several countermeasures.
翻译:FPGA的安全是一个关键议题,因为硬件中的任何弱点,如果在安全的设计中使用,都可能产生严重后果。由于FPGA设计在比特流中编码,确保比特流至关重要。相反,许多动机是回收和操纵比特流,包括设计克隆、IP盗窃、操纵设计或设计颠覆,例如通过硬件Trojans。鉴于FPGA往往是网络物理系统的一部分,例如在航空、医疗或工业设备中,这甚至会导致身体伤害。因此,供应商引入了比特流加密,提供真实性和保密性。即使过去曾提议过对比特流加密的攻击,例如侧道分析和预测,这些攻击需要复杂的设备和相当的技术专长。在本文件中,我们引入了对Xilinx 7-Series(和Virtex-6)比特流加密的新低成本攻击,导致完全丧失真实性和保密性。我们利用了设计缺陷,将目标漏掉目标,即:我们不精密的系统在攻击中,使用比特盘的接口时,我们只需要远程分析,攻击工具。