Skip to main content

Secure Configuration of Field Programmable Gate Arrays

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2147))

Abstract

Although SRAM programmed Field Programmable Gate Arrays (FPGA’s) have come to dominate the industry due to their density and performance advantages over non-volatile technologies they have a serious weakness in that they are vulnerable to piracy and reverse engineering of the user design. This is becoming increasingly important as the size of chips - and hence the value of customer designs - increases. FPGA’s are now being used in consumer products where piracy is more common. Further, reconfiguration of FPGA’s in the field is becoming increasingly popular particularly in networking applications and it is vital to provide security against malicious parties interfering with equipment functionality through this mechanism.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dipert, B., “Cunning Circuits Confound Crooks”, EDN Magazine, October 12, 2000.

    Google Scholar 

  2. Actel Corporation, “Protecting your Intellectual Property from the Pirates”, presentation at DesignCon’ 98. Available from http://www.actel.com.

  3. Xilinx Inc., “Using Bitstream Encryption”, in Chapter 2 of the Virtex II Platform FPGA Handbook available from http://www.xilinx.com.

  4. Steven A. Guccione, Delon Levi and Prasanna Sundararajan, “Jbits: A Java-based Interface for Reconfigurable Computing”. Proceedings 2nd Annual Military and Aerospace Applications of Programmable Devices and Technologies Conference (MAPLD).

    Google Scholar 

  5. Atmel Corp., “Atmel Introduces Secure FPLSIC”, Press Release, Atmel Corp, Oct 12, 2000.

    Google Scholar 

  6. Austin, K., US Patent 5,388,157 “Data Security Arrangements for Semiconductor Programmable Devices”

    Google Scholar 

  7. Algotronix Ltd., “Method and Apparatus for Secure Configuration of a Field Programmable Gate Array”, PCT Patent Application PCT/GB00/04988.

    Google Scholar 

  8. Erickson, C, US Patent 5,970,142 “Configuration Stream Encryption”

    Google Scholar 

  9. Sang, C, et al, US Patent 5,915,017 “Method and Apparatus for Securing Programming Data of Programmable Logic Device”

    Google Scholar 

  10. Actel Corp., “60RS Family SPGA’s”, Advanced Data Sheet. Available from http://www.actel.com.

  11. Kessner, D., “Copy Protection for SRAM based FPGA Designs”, Application Note, Free IP Project, http://www.free-ip.com/copvprotection.html.

  12. Algotronix Ltd., “Method of using a Mask Programmed Key to Securely Configure a Field Programmable Gate Array”, Unpublished pending patent application.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kean, T. (2001). Secure Configuration of Field Programmable Gate Arrays. In: Brebner, G., Woods, R. (eds) Field-Programmable Logic and Applications. FPL 2001. Lecture Notes in Computer Science, vol 2147. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44687-7_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-44687-7_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42499-4

  • Online ISBN: 978-3-540-44687-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics