Data extraction from flash memory and reverse engineering using Xilinx 7 series FPGA boards

Dongchan Lee, Sanghyun Lee, Mannhee Cho, Hyung Min Lee, Youngmin Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this paper, we introduce a general methodology of reverse engineering for Xilinx FPGA devices using flash memory for programming. Based on the structural analysis of the flash memory used for the most recent 7-Series FPGA, data extraction for reverse engineering is carried out targeting the flash memory with the help of a logic analyzer. The accuracy of the extracted bitstream is finally verified using the in-house reverse engineering tool.

Original languageEnglish
Title of host publicationProceedings - International SoC Design Conference 2022, ISOCC 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages330-331
Number of pages2
ISBN (Electronic)9781665459716
DOIs
Publication statusPublished - 2022
Event19th International System-on-Chip Design Conference, ISOCC 2022 - Gangneung-si, Korea, Republic of
Duration: 2022 Oct 192022 Oct 22

Publication series

NameProceedings - International SoC Design Conference 2022, ISOCC 2022

Conference

Conference19th International System-on-Chip Design Conference, ISOCC 2022
Country/TerritoryKorea, Republic of
CityGangneung-si
Period22/10/1922/10/22

Bibliographical note

Publisher Copyright:
© 2022 IEEE.

Keywords

  • FPGA
  • Reverse Engineering
  • bitstream
  • flash memory
  • logic analyzer

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Science Applications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Data extraction from flash memory and reverse engineering using Xilinx 7 series FPGA boards'. Together they form a unique fingerprint.

Cite this