A Side-Channel Analysis Method Against Bitstream Encryption of Virtex-7
With the wide application of FPGA in the fields such as commercial or national defense,the security of FPGA is facing great challenges and many attacks against FPGA have been proposed.In order to further research the security mechanism of the FPGA,this paper introduced a new Side-Channel Analysis(SCA)method and firstly studied the security vulnerabilities of bitstream encryption in the loading process of Xilinx Virtex-7 chips.Compared with previous targets,Virtex-7 chips have larger chip scale,lower signal-to-noise ratio,and are more difficult to be attacked.Previous studies always use SASEBO or SAKURA boards that are specially designed for SCA,while this study is the first to be carried out on Xilinx official evaluation board.The board does not consider the side-channel measurement acquisition case,so some manually modification is needed and then an adequate signal-to-noise ratio can be obtained.The Electro Magnetic(EM)radiation was took as the side-channel measurement,and each set key can be obtained within 800,000 EM traces.The adversary can obtain the bitstream plaintext by using the key,and then reverse the FPGA design or clone products,and so on.It will affect the security of FPGA.
bitstream encryptionelectro magnetic side-channel analysis(EM SCA)Xilinx Virtex-7