Security for volatile FPGAs
With recongurable devices fast becoming complete systems in their own right, interest in their security properties has increased. While research on "FPGA security" has been active since the early 2000s, few have treated the field as a whole, or framed its challenges in the context of the unique FPGA usage model and application space. This dissertation sets out to examine the role of FPGAs within a security system and how solutions to security challenges can be provided. I offer the following contributions. I motivate authenticating configurations as an additional capability to FPGA configuration logic, and then describe a exible security protocol for remote reconfiguration of FPGA-based systems over insecure networks. Non-volatile memory devices are used for persistent storage when required, and complement the lack of features in some FPGAs with tamper proong in order to maintain specified security properties. A unique advantage of the protocol is that it can be implemented on some existing FPGAs (i.e., it does not require FPGA vendors to add functionality to their devices). Also proposed is a solution to the "IP distribution problem" where designs from multiple sources are integrated into a single bitstream, yet must maintain their condentiality. I discuss the diculty of reproducing and comparing FPGA implementation results reported in the academic literature. Concentrating on cryptographic implementations, problems are demonstrated through designing three architecture-optimized variants of the AES block cipher and analyzing the results to show that single figures of merit, namely "throughput" or "throughput per slice", are often meaningless without the context of an application. To set a precedent for reproducibility in our field, the HDL source code, simulation testbenches and compilation instructions are made publicly available for scrutiny and reuse. Finally, I examine payment systems as ubiquitous embedded devices, and evaluate their security vulnerabilities as they interact in a multi-chip environment. Using FPGAs as an adversarial tool, a man-in-the-middle attack against these devices is demonstrated. An FPGA-based defense is also demonstrated: the first secure wired "distance bounding" protocol implementation. This is then put in the context of securing recongurable systems.
Summary
This PhD thesis examines the security challenges of volatile, reconfigurable FPGAs and positions the device as an active element in system security. Readers will learn practical protocols and architectural mechanisms for authenticating and securely remotely reconfiguring FPGA designs over insecure networks, plus analyses of persistent storage and attack vectors.
Key Takeaways
- Explain the threat model for volatile FPGAs and the security requirements for configuration and runtime assets.
- Design a flexible protocol for secure remote reconfiguration, including bitstream authentication and integrity checks.
- Implement use of non-volatile storage and configuration logic to provide persistent security properties across reconfigurations.
- Evaluate common attack classes (network, configuration interception, and physical tampering) and apply mitigation strategies at the architecture and protocol levels.
Who Should Read This
Advanced FPGA engineers, security researchers, and graduate students focused on secure system design who need to understand bitstream authentication, remote reconfiguration protocols, and architecture-level FPGA defenses.
Still RelevantAdvanced
Related Documents
- Architecture of FPGAs and CPLDs: A Tutorial Still RelevantIntermediate
- Physical Synthesis Toolkit for Area and Power Optimization on FPGAs Still RelevantAdvanced
- Performance driven FPGA design with an ASIC perspective Still RelevantAdvanced
- Implementing video compression algorithms on reconfigurable devices Still RelevantAdvanced
- Free Range VHDL Still RelevantIntermediate






