1 FPGA Design Security Issues: Using Lattice FPGAs to Achieve High Design Security
A Lattice Semiconductor White Paper
FPGA Design Security Issues:
Using Lattice FPGAs to Achieve High Design
Security
A Lattice Semiconductor White Paper
September 2007
Lattice Semiconductor
5555 Northeast Moore Ct.
Hillsboro, Oregon 97124 USA
Telephone: (503) 268-8000
www.latticesemi.com
2 FPGA Design Security Issues: Using Lattice FPGAs to Achieve High Design Security
A Lattice Semiconductor White Paper
Introduction..................................................................................................................................... 3
How Does A Design Get Pirated? ..................................................................................................3
Cloning........................................................................................................................................ 3
Reverse Engineering ................................................................................................................... 4
Overbuilding ............................................................................................................................... 4
Theft of Services......................................................................................................................... 4
Hardware Security Risks................................................................................................................. 4
Security Level ............................................................................................................................. 5
Good FPGA Security Features.................................................................................................... 6
ASIC Technology ....................................................................................................................... 7
SRAM FPGA.............................................................................................................................. 7
One Time Programmable FPGA Technology............................................................................. 7
Non-volatile Reprogrammable FPGA Technology .................................................................... 8
Hybrid Non-Volatile FPGA.................................................................................................... 8
Monolithic Non-Volatile FPGA ............................................................................................. 8
FPGA Conguration Pattern Encryption .................................................................................... 8
Lattice FPGA Security Solutions.................................................................................................... 9
LatticeECP2 and Lattice ECP2M S-Series FPGAs ...................................................................... 10
LatticeXP and LatticeXP2 Non-Volatile FPGAs ......................................................................... 10
Removal of the External Bitstream Path................................................................................... 11
Locking the Conguration with LatticeXP and LatticeXP2 Devices....................................... 11
Techniques For Achieving Conguration Security .................................................................. 11
Multiple Hidden Security Bits .............................................................................................. 12
Security Bits Duplicated in SRAM and Non-volatile Memory............................................ 12
Multiple Paths From Non-volatile to SRAM Memory......................................................... 12
Trying to Break the Lock...................................................................................................... 12
LatticeXP2 Advanced Security Settings....................................................................................... 13
Encryption................................................................................................................................. 13
Access Control Settings ............................................................................................................ 13
Configuration Security Bit.................................................................................................... 13
Flash Protect.......................................................................................................................... 13
LatticeXP and LatticeXP2 Ease of Use ........................................................................................ 14
Easy To Use In Development ................................................................................................... 14
Manufacturing Security with the LatticeXP and LatticeXP2 ................................................... 14
Conclusions................................................................................................................................... 15
Technical Support Assistance....................................................................................................... 15