@inproceedings{c5778ad56e004bb9a6dfaa466e0b3454,
title = "Data extraction from flash memory and reverse engineering using Xilinx 7 series FPGA boards",
abstract = "In this paper, we introduce a general methodology of reverse engineering for Xilinx FPGA devices using flash memory for programming. Based on the structural analysis of the flash memory used for the most recent 7-Series FPGA, data extraction for reverse engineering is carried out targeting the flash memory with the help of a logic analyzer. The accuracy of the extracted bitstream is finally verified using the in-house reverse engineering tool.",
keywords = "bitstream, flash memory, FPGA, logic analyzer, Reverse Engineering",
author = "Dongchan Lee and Sanghyun Lee and Mannhee Cho and Lee, {Hyung Min} and Youngmin Kim",
note = "Funding Information: ACKNOWLEDGMENT This work was supported as part of Military Crypto Research Center (UD210027XD) funded by Defense Acquisition Program Administration (DAPA) and Agency for Defense Development (ADD). Publisher Copyright: {\textcopyright} 2022 IEEE.; 19th International System-on-Chip Design Conference, ISOCC 2022 ; Conference date: 19-10-2022 Through 22-10-2022",
year = "2022",
doi = "10.1109/ISOCC56007.2022.10031296",
language = "English",
series = "Proceedings - International SoC Design Conference 2022, ISOCC 2022",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "330--331",
booktitle = "Proceedings - International SoC Design Conference 2022, ISOCC 2022",
}