Abstract
Obtaining a knowledge of internal structure of a Field Programmable Gate Array (FPGA), together with the vulnerable spots that can be targeted by a laser fault injection, can be a time-consuming task when done manually. In this chapter, we present an automated method to identify regions of interest in an FPGA, such as logic arrays and cells. Such method identifies circuits that are implemented in FPGA and helps the attacker to determine which fault models are achievable with a given laser fault injection equipment. The chapter follows a step-by-step methodology of evaluation, starting with the chip decapsulation and preparation, followed by the characterization of the laser pulse interaction with the silicon. Later it focuses on the automated profiling itself, with a case study on Virtex-5 FPGA.
Original language | English |
---|---|
Title of host publication | Automated Methods in Cryptographic Fault Analysis |
Publisher | Springer International Publishing |
Pages | 301-325 |
Number of pages | 25 |
ISBN (Electronic) | 9783030113339 |
ISBN (Print) | 9783030113322 |
DOIs | |
Publication status | Published - Jan 1 2019 |
Externally published | Yes |
Bibliographical note
Publisher Copyright:© Springer Nature Switzerland AG 2019.
ASJC Scopus Subject Areas
- General Engineering
- General Computer Science