http://www.adapticom1.net/FPGA/FPGA-Security.html
Adapticom Inc.
P.O. Box 91461,
Raleigh, NC 27675-1461,
919/870-0608
Item | Risk assessment: Vulnerability of FPGA's to yield information to unauthorized parties after field installation and techniques available to minimize such a risk. | Industry wide review of FPGA "manufacturer supplied" techniques for securing the content of FPGA devices. | Use of unconventional, non-electronic, techniques to intrude on FPGA security and determine internal content of device. | Use / "misuse" of commercially available, manufacturer supported tools and probes to circumvent existing FPGA security features and reveal content. | Use of third party or custom electronic tools (logic analyzers, oscilloscopes, custom circuitry) to circumvent FPGA security features in order to reveal device content. | Analysis of availability of tools and techniques to reassemble the design and determine function from revealed content. | Recommended Design Practices: Design and Programming techniques and merits thereof that can be incorporated to maximize security of FPGA content after deployment to the field. | |
---|
Establish FPGA security vulnerabilities: revealing functionality or programming information after field installation. (Establish effectiveness of mfg. supplied security bit and/or other security features to protect content.)
Comments to:
http://www.adapticom1.net/mailto