S-Box attack using FPGA reverse engineering for lightweight cryptography
N Im, S Choi, H Yoo - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Since the use of lightweight cryptography for Internet of Things (IoT) security increases, it is
necessary to inform significant threats to IoT devices through research on the attacks of …
necessary to inform significant threats to IoT devices through research on the attacks of …
Turning the table: Using bitstream reverse engineering to detect FPGA trojans
According to recent reports and surveys over the last 2 years, field-programmable gate
arrays (FPGAs) have increasingly become the prime targets for carrying out extremely …
arrays (FPGAs) have increasingly become the prime targets for carrying out extremely …
Bitstream reverse engineering of Microsemi's VersaTile-based FPGAs
Y Kim, EG Jung, CK Kim - 2021 IEEE Physical Assurance and …, 2021 - ieeexplore.ieee.org
Recent research has shown that it is possible to render **linx FPGAs vulnerable to security
issues such as injecting trojans, compromising cryptographic primitives, or bypassing secure …
issues such as injecting trojans, compromising cryptographic primitives, or bypassing secure …
Multi Look-up Table FPGA Reverse Engineering with Bitstream Extraction and Multiple PIP/PLP Matching
Owing to the recognition of the field-programmable gate array (FPGA) as a key component
of Internet of Things (IoT) devices, there has been exponential growth in the demand for …
of Internet of Things (IoT) devices, there has been exponential growth in the demand for …
Detection of Stealthy Bitstreams in Cloud FPGAs using Graph Convolutional Networks
FPGAs are frequently utilized in cloud computing environments for high performance
computing and neural network accelerators. Furthermore, multi-tenancy allows multiple …
computing and neural network accelerators. Furthermore, multi-tenancy allows multiple …
REVBiT: REVerse Engineering of BiTstream for LUT Extraction & Logic Identification
Field-Programmable Gate Arrays (FPGAs) are widely used in various applications due to
their flexibility and reconfigurability, and they store the functionality of digital design in the …
their flexibility and reconfigurability, and they store the functionality of digital design in the …
Determining Confidence in FPGA Bitstream Reverse Engineering Results
Reverse engineering (RE) is a widespread practice within engineering, and it is particularly
relevant for discovering maliciousfunctionality in digital hardware components. In this paper …
relevant for discovering maliciousfunctionality in digital hardware components. In this paper …
A New Methodology to Manage FPGA Distributed Memory Content via Bitstream for **linx ZYNQ Devices
J Gomez-Cornejo, I Aranzabal, IL Ropero, AJ Mazón… - Electronics, 2022 - mdpi.com
This paper proposes a methodology to access data and manage the content of distributed
memories in FPGA designs through the configuration bitstream. Thanks to the methods …
memories in FPGA designs through the configuration bitstream. Thanks to the methods …
Fast FPGA Reverse Engineering for Hardware Metering and Fingerprinting
A Perumalla, H Stowasser… - NAECON 2023-IEEE …, 2023 - ieeexplore.ieee.org
We describe a fast, abstract method for reverse engineering (RE) field programmable gate
array (FPGA) look-up-tables (LUTs). Our method has direct applications to hardware (HW) …
array (FPGA) look-up-tables (LUTs). Our method has direct applications to hardware (HW) …
[PDF][PDF] FPGA tabanlı uzaktan laboratuvar uygulamaları
FPGA TABANLI UZAKTAN LABORATUVAR UYGULAMALARI ORCID: 0000-0002-9606-5348
Afyon Kocatepe Üniversitesi, Fen Bilimleri Enstitüsü Page 1 5. BİLSEL INTERNATIONAL …
Afyon Kocatepe Üniversitesi, Fen Bilimleri Enstitüsü Page 1 5. BİLSEL INTERNATIONAL …