Home > On-Demand Archives > Talks >

Hacking FPGAs & SoC FPGAs

Oren Hollander - Watch Now - Duration: 37:58

Hacking FPGAs & SoC FPGAs
Oren Hollander

FPGAs are increasingly being used in sensitive applications. Examples include our national infrastructures (power grids, network routers, satellites), transportation (planes, trains, automobiles), military equipment (weapons, radar, software  defined radio) and medical devices.

Unfortunately, as FPGA hardware continues to become more powerful and cheaper, it also becomes more attractive to attackers to attempt and exploit any security weakness in them.

Such attacks have serious consequences. They can steal confidential information, modify the system to perform devious, unintended activities, perform denial of service, or even destroy the system.

Therefore, securing is of utmost importance!

Unfortunately, the security of FPGA has largely been ignored (until recently).

In this talk we discuss the possible attacks against FPGAs & SoC FPGAs, and what are the technologies, methods, tools and techniques that are used to secure FPGAs.

italicssurround text with
boldsurround text with
**two asterisks**
or just a bare URL
surround text with
strikethroughsurround text with
~~two tilde characters~~
prefix with

Score: 0 | 1 month ago | no reply

This was a highly interesting presentation reflecting ‘The World we live in!’. Thank you.

As prevention is always better than the cure, a couple of ideas.

Would an on-chip monitoring sub-system that could diagnose pin-loading anomalies be viable i.e. high pin counts, real-estate costs et al? Also, abnormal chip core functionality checks i.e. using AI techniques similar to what Darktrace has done at the application level but within the chip cores themselves?

For non-invasive (non-contact) attacks, especially electro-magnetic sensing but also potentially for light interference, would a monitored Faraday Cage at the silicon die level be manufacturable? This assumes that sufficient thought is given for normal operating thermal heat to escape, amongst other things!

Admittedly, your focus is teaching others SoC/FPGA security including how to perform such attacks i.e. highlighting potential security flaws as opposed to providing solutions to prevent them from occurring in the first place!