Paper 2016/641
Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs
Pawel Swierczynski, Georg T. Becker, Amir Moradi, and Christof Paar
Abstract
This contribution is concerned with the question whether an adversary can automatically manipulate an unknown FPGA bitstream realizing a cryptographic primitive such that the underlying secret key is revealed. In general, if an attacker has full knowledge about the bitstream structure and can make changes to the target FPGA design, she can alter the bitstream leading to key recovery. However, this requires challenging reverse-engineering steps in practice. We argue that this is a major reason why bitstream fault injection attacks have been largely neglected in the past. In this paper, we show that malicious bitstream modifications are i) much easier to conduct than commonly assumed and ii) surprisingly powerful. We introduce a novel class of bitstream fault injection (BiFI) attacks which does not require any reverse-engineering. Our attacks can be automatically mounted without any detailed knowledge about either the bitstream format of the design or the crypto primitive which is being attacked. Bitstream encryption features do not necessarily prevent our attack if the integrity of the encrypted bitstream is not carefully checked. We have successfully verified the feasibility of our attacks in practice by considering several publicly available AES designs. As target platforms, we have conducted our experiments on Spartan-6 and Virtex-5 Xilinx FPGAs.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Minor revision. IEEE Transactions on Computers
- Keywords
- FPGA securitybitstream fault injectionautomated key recoveryAESbitstream encryption vulnerability
- Contact author(s)
- pawel swierczynski @ rub de
- History
- 2016-12-28: last of 3 revisions
- 2016-06-21: received
- See all versions
- Short URL
- https://ia.cr/2016/641
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/641, author = {Pawel Swierczynski and Georg T. Becker and Amir Moradi and Christof Paar}, title = {Bitstream Fault Injections ({BiFI}) – Automated Fault Attacks against {SRAM}-based {FPGAs}}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/641}, year = {2016}, url = {https://eprint.iacr.org/2016/641} }