A recent paper published by a team of German researchers concludes that the bitstream encryption mechanism of Xilinx Virtex-4 and Virtex-5 FPGAs can be "completely broken with moderate effort" through side-channel analysis attacks, posing a potential risk of IP theft and more serious issues.
A recent paper published by a team of German researchers concludes that the bitstream encryption mechanism of Xilinx Virtex-4 and Virtex-5 FPGAs can be "completely broken with moderate effort" through side-channel analysis attacks, posing a potential risk of IP theft and more serious attacks such as reverse engineering or the introduction of hardware Trojans.
The researchers—Amir Moradi, Markus Kasper and Christof Paar of the Horst Gortz Institute for IT-Security at Ruhr University in Bochum, Germany—reported using off-the-shelf hardware to extract the bitstream encryption keys by monitoring the power consumption of the device during power up. Analyzing the power traces the researchers were able to identify the instances where decryption occurs within the devices and then, using a statistical technique known as differential power analysis, crack the AES-256 key.
The researchers reported recovering the Virtex-4 key in six hours and recovering the Virtex-5 key in nine hours. To the best of their knowledge, the paper reports the first successful attack against the bitstream encryption of Virtex-4 and Virtex-5 devices.
The attacks demonstrate that industrial products require the implementation of side-channel countermeasures and "that side-channel attacks are not a pure academic playground but have a real-world impact in the security of embedded systems," the researchers wrote in the paper, titled "On the Portability of Side-Channel Attacks."
A spokesperson for Xilinx said the company is aware of the potential vulnerability of FPGAs to side-channel differential power analysis attacks such as the one described in the paper and that Xilinx has researchers dedicated to studying all facets of the security of FPGAs. The spokesperson said such attacks require a certain degree of sophistication, a high level of motivation and for the attacker to physically access and modify the board on which the FPGA sits. No Xilinx customer has ever reported being victimized by one of these attacks, the spokesman said.
For customers concerned about these types of attacks or others, there are countermeasures at the system level and anti-tampering technology that they can take advantage of, the spokesman said.