Browse > Article
http://dx.doi.org/10.5392/JKCA.2018.18.01.010

Implementation of a Logic Extraction Algorithm from a Bitstream Data for a Programmed FPGA  

Jeong, Min-Young (충북대학교 전자정보대학 정보통신공학과)
Lee, Jae-Heum (충북대학교 전자정보대학 정보통신공학과)
Jang, Young-Jo (한국기술교육대학 전자공학과)
Jung, Eun-Gu (ETRI 부설연구소)
Cho, Kyoung-Rok (충북대학교 전자정보대학 정보통신공학과)
Publication Information
Abstract
This paper presents a method to resynthesize logic of a programmed FPGA from a bitstream file that is a downloaded file for Xilinx FPGA (Field Programmable Gate Array). It focuses on reconfiguring the LUT (Look Up Table) logic. The bitstream data is compared and analyzed considering various situations and various input variables such as composing other logics using the same netlist or synthesizing the same logic at various positions to find a structure of the bitstream. Based on the analyzed bitstream, we construct a truth table of the LUT by implementing various logic for one LUT. The proposed algorithm extracts the logic of the LUT based on the truth table of the generated LUT and the bitstream. The algorithm determines the input and output pins used to implement the logic in the LUT. As a result, we extract a gate level logic from a bitstream file for the targeted Xillinx FPGA.
Keywords
Reverse Engineering; LUT; Bitstream; FPGA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jean-Baptiste and Eric Rannaud, "From the bitstream to the netlist," FPGA, Vol.8, 2008.
2 Benz, Florian, Andre Seffrin, and Sorin A. Huss, "Bil: A tool-chain for bitstream reverseengineering," Field programmable logic and applications (FPL), 2012 22nd International Conference on. IEEE, pp.735-738, 2012.
3 Soni, Ritesh K. Open-Source Bitstream Generation for FPGAs. Diss. Virginia Tech, 2013.
4 https://www.xilinx.com/support/documentation/user_guides/ug470_7Series_Config.pdf
5 https://www.xilinx.com/support/documentation/sw_manuals/xilinx2014_1/ug893-vivado-ide.pdf
6 A. Moradi, A. Barenghi, T. Kasper, and C. Paar, "On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs," Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011.
7 M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.
8 J. L. Zhang, W. Z. Wang, X. W. Wang, and Z. H. Xia, "Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding," Journal of Computer Science and Technology, Vol.32, No.2, pp.329-339, 2017.   DOI
9 Y. Hori, A. Satoh, H. Sakane, and K. Toda, "Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems," Field Programmable Logic and Applications, 2008. FPL 2008. International Conference on. IEEE, 2008.