Author

Topic: FPGA Bitstream Security Broken (Read 1989 times)

newbie
Activity: 36
Merit: 0
July 22, 2011, 08:25:39 AM
#5
oh
newbie
Activity: 54
Merit: 0
July 22, 2011, 01:09:45 AM
#4
Researchers in Germany released a pair of papers documenting severe power analysis vulnerabilities in the bitstream encryption of multiple Xilinx FPGAs. The problem exposes products using FPGAs to cloning, hardware Trojan insertion, and reverse engineering. Unfortunately, there is no easy downloadable fix, as hardware changes are required. These papers are also a reminder that differential power analysis (DPA) remains a potent threat to unprotected hardware devices. On the FPGA front, only Actel seems to be tackling the DPA issue so far, although their FPGAs are much smaller than Xilinx's.


Slashdot @ http://it.slashdot.org/story/11/07/21/1753217/FPGA-Bitstream-Security-Broken


...could be bad news for FPGA miners alike...
This has no impact on FPGA miners, because the designs are completely open source.  You can't steal something that's already open.

hero member
Activity: 560
Merit: 517
July 21, 2011, 11:04:00 PM
#3
The highest performance, working FPGA miner is currently based on Altera FPGAs. Altera did a fantastic job protecting their FPGAs; they are absolutely 100% immune to all bitstream encryption attacks ... mostly because Altera FPGAs don't actually have encrypted bitstreams  Tongue

Jokes aside, thank you for sharing the news!
legendary
Activity: 1904
Merit: 1002
July 21, 2011, 06:58:14 PM
#2
Researchers in Germany released a pair of papers documenting severe power analysis vulnerabilities in the bitstream encryption of multiple Xilinx FPGAs. The problem exposes products using FPGAs to cloning, hardware Trojan insertion, and reverse engineering. Unfortunately, there is no easy downloadable fix, as hardware changes are required. These papers are also a reminder that differential power analysis (DPA) remains a potent threat to unprotected hardware devices. On the FPGA front, only Actel seems to be tackling the DPA issue so far, although their FPGAs are much smaller than Xilinx's.


Slashdot @ http://it.slashdot.org/story/11/07/21/1753217/FPGA-Bitstream-Security-Broken


...could be bad news for FPGA miners alike...


Not really, unless you're looking to profit from a proprietary design... All it means is someone can copy the design off the hardware.  Since the prominent FPGA design is open source, this is not really a threat.
newbie
Activity: 36
Merit: 0
July 21, 2011, 06:22:13 PM
#1
Researchers in Germany released a pair of papers documenting severe power analysis vulnerabilities in the bitstream encryption of multiple Xilinx FPGAs. The problem exposes products using FPGAs to cloning, hardware Trojan insertion, and reverse engineering. Unfortunately, there is no easy downloadable fix, as hardware changes are required. These papers are also a reminder that differential power analysis (DPA) remains a potent threat to unprotected hardware devices. On the FPGA front, only Actel seems to be tackling the DPA issue so far, although their FPGAs are much smaller than Xilinx's.


Slashdot @ http://it.slashdot.org/story/11/07/21/1753217/FPGA-Bitstream-Security-Broken


...could be bad news for FPGA miners alike...
Jump to: