Secure eFPGA Configuration: A System-Level Approach

  • Conference paper
  • First Online:
Applied Reconfigurable Computing. Architectures, Tools, and Applications (ARC 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14553))

Included in the following conference series:

  • 293 Accesses

Abstract

Field Programmable Gate Arrays (FPGAs) have repeatedly proven their importance in modern computing, delivering high flexibility while minimizing performance trade-offs and engineering costs compared to Application-Specific Integrated Circuits (ASICs). However, to achieve this level of flexibility, FPGAs require configuration, presenting a non-trivial initialization procedure accompanied by the inherent hardware security challenge focused on protecting the confidentiality of the user’s sensitive configuration data. This paper presents the Programming Management Unit (PMU) as an open-source core to address embedded FPGA (eFPGA) configuration and bitstream protection with a co-design implementation approach. The PMU hardware is meant to be adaptable for easy integration into open-source projects, providing a nexus for standardized communication protocols, cryptographic cores, and eFPGA configuration memory architectures. Moreover, this project aims to support the entire end-to-end configuration procedure, spanning from bitstream generation to eFPGA configuration memory, necessitating a software-based frond-end for encipherment, encoding, and delivery to PMU hardware. Showcasing the PMU within a practical context, this paper details an application where the PMU interfaces with JTAG, AES, SHA, and OpenFPGA eFPGA fabric carried out in the Skywater130 technology node. This demonstration highlights the PMU’s efficiency by illustrating the system-level trade-offs between area, power consumption, configuration time, and security protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 96.29
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 128.39
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmad, B., et al.: Don’t CWEAT it: toward CWE analysis techniques in early stages of hardware design. In: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, pp. 1–9 (2022)

    Google Scholar 

  2. AMD: 7 Series FPGAs Configuration, User Guide, December 2023. https://docs.xilinx.com/v/u/en-US/ug470_7Series_Config

  3. AMD: Virtex-5 FPGAs Configuration User Guide, February 2023. https://docs.xilinx.com/v/u/en-US/ug191

  4. Badrignans, B., Elbaz, R., Torres, L.: Secure FPGA configuration architecture preventing system downgrade. In: 2008 International Conference on Field Programmable Logic and Applications, pp. 317–322 (2008). https://doi.org/10.1109/FPL.2008.4629951

  5. Barker, E.: Recommendation for key management: Part 1 - general. NIST Special Publication 800-57 Part 1 4 (2020)

    Google Scholar 

  6. Blodget, B., McMillan, S., Lysaght, P.: A lightweight approach for embedded reconfiguration of FPGAs. In: 2003 Design, Automation and Test in Europe Conference and Exhibition, pp. 399–400 (2003). https://doi.org/10.1109/DATE.2003.1253642

  7. Boutros, A., Betz, V.: FPGA architecture: principles and progression. IEEE Circuits Syst. Mag. 21(2), 4–29 (2021). https://doi.org/10.1109/MCAS.2021.3071607

    Article  Google Scholar 

  8. Daoud, L., Hussein, F., Rafla, N.: Real-time bitstream decompression scheme for FPGAs reconfiguration. In: 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1082–1085 (2018). https://doi.org/10.1109/MWSCAS.2018.8624003

  9. Duncan, A., Rahman, F., Lukefahr, A., Farahmandi, F., Tehranipoor, M.: FPGA bitstream security: a day in the life. In: 2019 IEEE International Test Conference (ITC), pp. 1–10 (2019). https://doi.org/10.1109/ITC44170.2019.9000145

  10. Barker, E., Roginsk, A.: Recommendation for key generation. NIST Special Publication 800-113 (2012)

    Google Scholar 

  11. Gruwell, A., Zabriskie, P., Wirthlin, M.: High-speed FPGA configuration and testing through JTAG. In: 2016 IEEE AUTOTESTCON, pp. 1–8 (2016). https://doi.org/10.1109/AUTEST.2016.7589601

  12. Hill, B., et al.: Precision medicine and FPGA technology: challenges and opportunities (2017). https://doi.org/10.1109/MWSCAS.2017.8053008

  13. Hu, W., Chang, C.H., Sengupta, A., Bhunia, S., Kastner, R., Li, H.: An overview of hardware security and trust: threats, countermeasures, and design tools. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), 1010–1038 (2021). https://doi.org/10.1109/TCAD.2020.3047976

    Article  Google Scholar 

  14. Institute of Electrical and Electronics Engineers: IEEE Std. 1149.1 - Standard Test Access Port and Boundary-Scan Architecture. Technical report, 1149.1-2013. IEEE (2013)

    Google Scholar 

  15. Intel: Executing SDM Commands via JTAG Interface, March 2021. https://www.intel.com/content/www/us/en/docs/programmable/683313/current/overview.html

  16. Joshi, S., Mohanty, S.P., Kougianos, E.: Everything you wanted to know about PUFs. IEEE Potentials 36(6), 38–46 (2017). https://doi.org/10.1109/MPOT.2015.2490261

    Article  Google Scholar 

  17. Kean, T.: Secure configuration of a field programmable gate array. In: The 9th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2001), pp. 259–260 (2001). https://doi.org/10.1007/3-540-44687-7_15

  18. Leong, P.H.W.: Recent trends in FPGA architectures and applications. In: 4th IEEE International Symposium on Electronic Design, Test and Applications (delta 2008), pp. 137–141 (2008). https://doi.org/10.1109/DELTA.2008.14

  19. Lin, C.H., Yeh, Y.S., Chien, S.P., Lee, C.Y., Chien, H.S.: Generalized secure hash algorithm: SHA-X. In: 2011 IEEE EUROCON - International Conference on Computer as a Tool, pp. 1–4 (2011). https://doi.org/10.1109/EUROCON.2011.5929187

  20. Maqsood, F., Ahmed, M., Ali, M.M., Shah, M.A.: Cryptography: a comparative analysis for modern techniques. Int. J. Adv. Comput. Sci. Appl. 8(6) (2017)

    Google Scholar 

  21. Microsemi: IGLOO PLUS FPGA Fabric User’s Guide, August 2012. https://ww1.microchip.com/downloads/aemDocuments/documents/FPGA/ProductDocuments/UserGuides/iglooplus_ug.pdf

  22. Olofsson, A., Ransohoff, W., Moroze, N.: A distributed approach to silicon compilation: Invited. In: Proceedings of the 59th ACM/IEEE Design Automation Conference, DAC 2022, pp. 1343–1346. Association for Computing Machinery, New York, NY, USA (2022). https://doi.org/10.1145/3489517.3530673

  23. Research, G.V.: Field programmable gate array (FPGA) market size, share trends analysis report. https://www.grandviewresearch.com/industry-analysis/fpga-market

  24. Saday, A.: A review of FPGA-based applications and FPGA usage in the industrial area. In: Innovations and Technologies in Engineering, p. 171 (2022)

    Google Scholar 

  25. Sklavos, N., Chaves, R., Di Natale, G., Regazzoni, F.: Hardware Security and Trust Design and Deployment of Integrated Circuits in a Threatened Environment. 1st edn. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-44318-8. http://lib.ugent.be/catalog/ebk01:3710000001022125

  26. National Institute and Technology of Standards: Advanced encryption standard. NIST FIPS PUB 197 (2001)

    Google Scholar 

  27. Tang, X., Giacomin, E., Alacchi, A., Chauviere, B., Gaillardon, P.E.: OpenFPGA: an opensource framework enabling rapid prototy** of customizable FPGAs. In: 2019 29th International Conference on Field Programmable Logic and Applications (FPL), pp. 367–374 (2019). https://doi.org/10.1109/FPL.2019.00065

  28. Valea, E., Silva, M.D., Flottes, M.L., Natale, G.D., Rouzeyre, B.: Encryption-based secure JTAG. In: 2019 IEEE 22nd International Symposium on Design and Diagnostics of Electronic Circuits Systems (DDECS), pp. 1–6 (2019). https://doi.org/10.1109/DDECS.2019.8724654

  29. Williams, S., Baxter, M.: Icarus verilog: open-source verilog more than a year later. Linux J. 3 (2002)

    Google Scholar 

  30. Zeitouni, S., Vliegen, J., Frassetto, T., Koch, D., Sadeghi, A.R., Mentens, N.: Trusted configuration in cloud FPGAs. In: 2021 IEEE 29th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 233–241 (2021). https://doi.org/10.1109/FCCM51124.2021.00036

  31. Zhang, J., Qu, G.: Recent attacks and defenses on FPGA-based systems. ACM Trans. Reconfigurable Technol. Syst. 12(3) (2019). https://doi.org/10.1145/3340557

Download references

Acknowledgments

This work was supported by the NSF PPoSS Award No. 2217154.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Allen Boston .

Editor information

Editors and Affiliations

Ethics declarations

Disclosure of Interests

P.-E. Gaillardon has financial interests in the company RapidSilicon, Inc.

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Boston, A., Gauchi, R., Gaillardon, PE. (2024). Secure eFPGA Configuration: A System-Level Approach. In: Skliarova, I., Brox Jiménez, P., Véstias, M., Diniz, P.C. (eds) Applied Reconfigurable Computing. Architectures, Tools, and Applications. ARC 2024. Lecture Notes in Computer Science, vol 14553. Springer, Cham. https://doi.org/10.1007/978-3-031-55673-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-55673-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-55672-2

  • Online ISBN: 978-3-031-55673-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation