Improved side-channel analysis attacks on xilinx bitstream encryption of 5, 6, and 7 series

48Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since 2012, it is publicly known that the bitstream encryption feature of modern Xilinx FPGAs can be broken by side-channel analysis. Presented at CT-RSA 2012, using graphics processing units (GPUs) the authors demonstrated power analysis attacks mounted on side-channel evaluation boards optimized for power measurements. In this work, we extend such attacks by moving to the EM side channel to examine their practical relevance in real-world scenarios. Furthermore, by following a certain measurement procedure we reduce the search space of each part of the attack from 232 to 28, which allows mounting the attacks on ordinary workstations. Several Xilinx FPGAs from different families – including the 7 series devices – are susceptible to the attacks presented here.

Cite

CITATION STYLE

APA

Moradi, A., & Schneider, T. (2016). Improved side-channel analysis attacks on xilinx bitstream encryption of 5, 6, and 7 series. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9689, pp. 71–87). Springer Verlag. https://doi.org/10.1007/978-3-319-43283-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free