01 June 2012

Microsemi reacts to ProASIC3 fpga 'backdoor' claim

Two researchers claim to have used a variant of differential power analysis (dpa) to bypass the security settings in Microsemi's ProASIC3 fpgas – whose applications include secure military systems. Using pipeline emission analysis (pea) techniques, the researchers say they have managed to disable all security settings, while reprogramming other features.

In their paper (for more, follow the link below), the researchers claim they were able to detect and analyse a backdoor in ProASIC3 chips. They say this backdoor exists in silicon, rather than in firmware, and leaves devices open to a range of attacks.
The researchers claim that, by using pea techniques, they could discover a 'secret key' which allows access to an internal test mode, through which it is possible to disable all security on the chip. Microsemi has responded, claiming there is no designed feature in ProASIC3 fpgas that would enable user security to be circumvented.
In a statement, the company said the internal test mode could only be accessed by customers entering a passcode. It added that, because the researchers have not been in contact, their claims cannot be verified.
In the past, fpgas have been seen as a potential weak link when it comes to design security because, in many cases, the fpga's program would be loaded from a discrete memory and that data flow is open to abuse. However, more recent designs have addressed this issue through the use of AES encryption.
Nevertheless, Microsemi has acknowledged that fpgas are potentially vulnerable to dpa style attacks. "Microsemi anticipated the increasing threats to silicon device security from dpa type attacks and took action several years ago by licensing the dpa patent portfolio of Cryptography Research," it noted. This technology is said to be a feature of a new fpga range due to be launched shortly by Microsemi.
Meanwhile, it says users have the ability to program fpgas using the highest security setting. By selecting this, the use of any passcode to gain access to any device configuration is disabled.
The research paper does concede that ProASIC3 devices are 'at least 100 times harder to attack using DPA than non protected conventional microcontrollers' and that any attacks on the chips would be 'quite a challenging task'.

Graham Pitcher

Supporting Information



This material is protected by Findlay Media copyright
See Terms and Conditions.
One-off usage is permitted but bulk copying is not.
For multiple copies contact the sales team.

Do you have any comments about this article?

Add your comments


Your comments/feedback may be edited prior to publishing. Not all entries will be published.
Please view our Terms and Conditions before leaving a comment.

Related Articles

Altera gets 14nm test chips

Altera ruffled some industry feathers in February 2013 when it announced that ...

20bit SAR A/D converter

The MAX11905 is a 20bit successive approximation register (SAR) A/D converter ...

Hardened DSP blocks for FPGAs

Responding to the increasingly demanding task of designing floating point DSP ...

Roundtable: Demanding answers

Embedded systems have, in the main, been designed around microcontrollers. But ...

Focus on: Medical electronics

Medical devices and medical pcs need to become more powerful, faster and ...

Focus on: Programmable logic

In the world of programmable logic, the phrase 'ultra low density' stands out ...

Using Linux in medical devices

This whitepaper explores the issues that software developers and medical device ...

Adapting to the extremes of rugged design

Ruggedisation and reliability are key requirements for a wide range of embedded ...

Counterfdeit components and acoustic ...

This white paper from Alter Technology Group considers how the encapsulants ...

Embedded World: Mitsubishi unv

Mitsubishi Electric has announced new 8.4in SVGA (AA084SC01), 10.4in SVGA ...

Embedded World: Altera

Altera will showcase a suite of embedded fpga solutions at Embedded World 2012 ...

Embedded World: Rutronik

Rutronik will be presenting application specific solutions for the lighting, ...

Device Developers' Conference

20th May 2014, Holiday Inn, Bristol

Device Developers' Conference

22nd May 2014, Menzies Hotel, Cambridge

Device Developers' Conference

3rd June 2014, Cheadle House, Manchester

Ask the expert: DSP

Murtaza Ali is a Distinguished Member of Technical Staff (DMTS) at Texas ...

Virtex-7 2000T

Click on the link to watch the video of the demo of the world's highest ...

Industrial Interfaces

This video discusses industrial interface solutions for TI embedded processors. ...

FPGA market developments

The programmable logic market is notable not only for its products, but also ...

Richard Noble's Bloodhound Project diary

Late again – but it's the end of the year and we are going strong! The sheer ...

FPGAs come of age

Programmable logic devices have a range of aliases, but whatever you call them, ...

Rick Clemmer, ceo, NXP

Rick Clemmer believes high performance mixed signal is just one of the sectors ...

Henri Richard, Freescale

Freescale's chief sales and marketing officer tells Graham Pitcher that he's ...

Dave Bell, president, Intersil

Intersil's president updates Graham Pitcher on the company's progress in ...