Sponsors:

Organization:

Poster Session & Coffee Break

Time: Wednesday, 2019-04-10, 14:45PM - 15:15PM

Room: Wilhem-Köhler-Saal, S1|03/283

Proof-Carrying Hardware versus the Stealthy Malicious LUT Hardware Trojan

Qazi Arbab Ahmed, Tobias Wiersema, Marco Platzner

Reconfigurable hardware has received considerable attention as a platform that enables dynamic hardware updates and thus is able to adapt new configurations at runtime. However, due to their dynamic nature, e.g., field-programmable gate arrays (FPGA) are subject to a constant possibility of attacks, since each new configuration might be compromised. Trojans for reconfigurable hardware that evade state-of- the-art detection techniques and even formal verification, are thus a large threat to these devices. One such stealthy hardware Trojan, that is in- serted and activated in two stages by compromised electronic design au- tomation (EDA) tools, has recently been presented and shown to evade all forms of classical pre-configuration detection techniques. This paper presents a successful pre-configuration countermeasure against this “Ma- licious Look-up-table (LUT)”-hardware Trojan, by employing bitstream- level Proof-Carrying Hardware (PCH). We show that the method is able to alert innocent module creators to infected EDA tools, and to prohibit malicious ones to sell infected modules to unsuspecting customers.

Secure Local Configuration of Intellectual Property without a Trusted Third Party

Nadir Khan, Arthur Silitonga, Brian Pachideh, Sven Nitzsche, Jürgen Becker

Trading intellectual property (IP) for FPGAs relies on configuring devices securely. This is achieved by using built-in security features of modern FPGAs, i.e. internal decryption engines. The disadvantage of using these fea- tures is that a trusted third party (TTP) needs to be involved for the preparation of the devices. Previously published schemes, in this area, are dependent on a TTP that mediates between core vendors (CVs) and system developers (SDs), which poses a major flaw in the chain of trust. In this paper, we propose a scheme where CV and SD can establish a licensing agreement without the par- ticipation of a TTP using off-the-shelf products. The IP is delivered in a secure format using state-of-the-art encryption methods. Decryption of the IP is han- dled by an application running on the FPGA that furthermore guarantees a se- cure configuration of the device. In order to prevent reverse engineering (RE) of the application, we rely on the progress made in hardware-assisted software (HAS) protection using a tamper and side channel attack (SCA) resistant hard- ware component. As a result, the application establishes a chain of trust be- tween CVs and SDs without the need for a TTP.

ReM: a Reconfigurable Multipotent Cell for New Distributed Reconfigurable Architectures

Ludovica Bozzoli, Luca Sterpone

Recently, the usage of the reconfigurable computing devices has seen a sharp increase in many application fields. Several reconfigurable architectures have been proposed in the last decades, with different levels of granularity and complexity and SRAM-based Field Programmable Gate Array (FPGA) remains the target support to develop reconfigurable architectures. However, even if FPGA is an established technology, it is not fully optimized for detailed partial run time reconfiguration. In fact, FPGAs reconfiguration granularity is large, even if single resources are configured by few bits, since the amount of data to be re-loaded inside the configuration memory for small changes is huge. Con- sidering that the major bottleneck of reconfiguration is the excessive reconfigu- ration time, which is proportional to the number of bits to be reconfigured, when reconfiguration involves few basic resources, such architecture leads to a considerable overhead. In this paper, we propose a new reconfigurable computing architecture that im- plement distributed reconfiguration at the lowest granularity to maximize flexi- bility and scalability. This is obtained providing to the basic reconfigurable functional unit the ability to reconfigure itself and the neighbor units. In fact, each cell, beside functioning as Logic, Memory and Connectivity can also trig- ger reconfiguration for itself and for given portion of the array of cells. To show the feasibility and the advantages of our idea, we designed and implemented a Reconfigurable Multipotent Cell, ReM. The results obtained with the imple- mentation of benchmark circuits on this architecture confirm the advantages in terms of reconfiguration time.

Update or Invalidate: Influence of Coherence Protocols on Configurable HW Accelerators

Johanna Rohde, Lukas Johannes Jung, Christian Hochberger

Configurable hardware accelerators offer the opportunity to execute compute intense parts of applications with a higher performance and a higher en- ergy efficiency as in pure software execution. One important component in such accelerators is the memory access to the system memory. Typically, this is real- ized through a cache hierarchy. In this contribution, we implement two different cache coherence protocols in two different configurable HW accelerators on real hardware. Using multiple benchmarks, we evaluate the influence of the cache co- herence protocol on the execution time of the accelerators. As a result, we show that the Dragon protocol performs better than the MOESI protocol.

Important Dates:

► Paper Submission:
23 November 2018
► Paper Submission:
07 December 2018
► Tutorial Proposals:
18 January 2019
► Author Notification:
18 January 2019
► Camera-ready:
10 February 2019
► Symposium:
09 - 11 April 2019

News:

► 2019-02-11: Registration now open
Registration for the symposium is now open. Information about the registration and a link to the registration site is available.
ARC 2019 will feature a tutorial about the open-source TaPaSCo framework on Thursday afternoon.
► 2018-11-22: Deadline Extended
Due to popular demand, the paper submission deadline for ARC 2019 has been extended to December 7. We will not be able to offer any further extensions beyond that.
► 2018-11-01: Second CFP
The 2nd CFP announces the Program Committee and the planed Tutorials.
► 2018-10-18: Submission open
Manuscripts can now be submitted as described in the author guidelines.
► 2018-09-11: Special issue confirmed
Extended versions of selected papers are invited to a special issue of Springer’s Journal of Signal Processing Systems.
► 2018-08-30: CFP published
The CFP topics have been published.
► 2018-08-22: Deadlines Fixed
The deadlines for paper submission, author notification, and camera ready submission are available.
► 2018-07-31: Hotel rooms reserved
A number of nearby hotel rooms with preferential prices are available.
► 2018-06-27: Schedule changed
The conference date was shifted by one week.

Subscribe:

via RSS

Sponsors:

Organization: