Skip to main content

Showing 1–4 of 4 results for author: Kison, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.06195  [pdf, other

    cs.CR

    Stealing Maggie's Secrets -- On the Challenges of IP Theft Through FPGA Reverse Engineering

    Authors: Simon Klix, Nils Albartus, Julian Speith, Paul Staat, Alice Verstege, Annika Wilde, Daniel Lammers, Jörn Langheinrich, Christian Kison, Sebastian Sester-Wehle, Daniel Holcomb, Christof Paar

    Abstract: Intellectual Property (IP) theft is a cause of major financial and reputational damage, reportedly in the range of hundreds of billions of dollars annually in the U.S. alone. Field Programmable Gate Arrays (FPGAs) are particularly exposed to IP theft, because their configuration file contains the IP in a proprietary format that can be mapped to a gate-level netlist with moderate effort. Despite th… ▽ More

    Submitted 3 September, 2024; v1 submitted 11 December, 2023; originally announced December 2023.

    Comments: Extended version of ACM CCS'24 paper including appendices

  2. arXiv:2007.03549  [pdf, other

    cs.CR

    An Exploratory Analysis of Microcode as a Building Block for System Defenses

    Authors: Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz

    Abstract: Microcode is an abstraction layer used by modern x86 processors that interprets user-visible CISC instructions to hardware-internal RISC instructions. The capability to update x86 microcode enables a vendor to modify CPU behavior in-field, and thus patch erroneous microarchitectural processes or even implement new features. Most prominently, the recent Spectre and Meltdown vulnerabilities were mit… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: Published in ACM SIGSAC Conference on Computer and Communications Security (CCS'18)

  3. Hardware Reverse Engineering: Overview and Open Challenges

    Authors: Marc Fyrbiak, Sebastian Strauß, Christian Kison, Sebastian Wallat, Malte Elson, Nikol Rummel, Christof Paar

    Abstract: Hardware reverse engineering is a universal tool for both legitimate and illegitimate purposes. On the one hand, it supports confirmation of IP infringement and detection of circuit malicious manipulations, on the other hand it provides adversaries with crucial information to plagiarize designs, infringe on IP, or implant hardware Trojans into a target circuit. Although reverse engineering is comm… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: 2017 IEEE 2nd International Verification and Security Workshop (IVSW)

  4. arXiv:1910.00948  [pdf, other

    cs.CR

    Reverse Engineering x86 Processor Microcode

    Authors: Philipp Koppe, Benjamin Kollenda, Marc Fyrbiak, Christian Kison, Robert Gawlik, Christof Paar, Thorsten Holz

    Abstract: Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs to be patched in-place without requiring any special hardware. While it is well-known that CPUs are regularly updated with this mechanism, very little is known… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Journal ref: SEC 2017 Proceedings of the 26th USENIX Conference on Security Symposium Pages 1163-1180