S
suzero
Guest
Hello everybody.
I want to implement a security precaution against overbuilding an
clonning. However I have some questions. If I am implementing the design i
a Spartan 3A Device, I have Device DNA feature but I dont have any on-boar
cryptographic feature. In the documents from Xilinx it is written that,
1) Read Device DNA Value
2) Generate your active code
3) Compare the active code and previously generated code
4) If they are equal, just enable the real part of your design.
Here I wonder that, is that possible a hacker or theft just copies my .bi
file while downloading from PROM to FPGA and he makes some modifications i
my netlist. This modification can be just to tie the enable bit(s) to Vcc
Then, my security precaution will be bypassed and the real part of m
design will work always because of enable bit(s) that tied up to Vcc b
hacker.
---------------------------------------
Posted through http://www.FPGARelated.com
I want to implement a security precaution against overbuilding an
clonning. However I have some questions. If I am implementing the design i
a Spartan 3A Device, I have Device DNA feature but I dont have any on-boar
cryptographic feature. In the documents from Xilinx it is written that,
1) Read Device DNA Value
2) Generate your active code
3) Compare the active code and previously generated code
4) If they are equal, just enable the real part of your design.
Here I wonder that, is that possible a hacker or theft just copies my .bi
file while downloading from PROM to FPGA and he makes some modifications i
my netlist. This modification can be just to tie the enable bit(s) to Vcc
Then, my security precaution will be bypassed and the real part of m
design will work always because of enable bit(s) that tied up to Vcc b
hacker.
---------------------------------------
Posted through http://www.FPGARelated.com