Anthony Karnowski. A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing—hence.

Slides:



Advertisements
Similar presentations
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Advertisements

StreamBlade SOE TM Initial StreamBlade TM Stream Offload Engine (SOE) Single Board Computer SOE-4-PCI Rev 1.2.
Implementing Fault Tolerant Systems with Windows CE.NET Reliable System Design 2010 by: Amir M. Rahmani.
Basic Computer Hardware and Software.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Sales Manual B.Braun Space
Essential Introduction to Computers. What is a Computer? An electronic device, operating under the control of instructions stored in its own memory, that.
Computer Basics 1 Computer Basic 1 includes two lessons:
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
COMPUTER CONCEPTS Computer Information Systems. COURSE COMPETENCIES Explain the functions of computer system components. Describe the information processing.
Handheld TFTP Server with USB Andrew Pangborn Michael Nusinov RIT Computer Engineering – CE Design 03/20/2008.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
ENGIN112 L38: Programmable Logic December 5, 2003 ENGIN 112 Intro to Electrical and Computer Engineering Lecture 38 Programmable Logic.
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
DAKNET Presented By: rreema.
CS 151 Digital Systems Design Lecture 38 Programmable Logic.
Hardware and Software Basics. Computer Hardware  Central Processing Unit - also called “The Chip”, a CPU, a processor, or a microprocessor  Memory (RAM)
V Material obtained from summer workshop in Guildford County.
CHAPTER 2 Input & Output Prepared by: Mrs.sara salih 1.
Computer for Health Sciences
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
CSCI 1101 Intro to Computers 6. Local Area Networks.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
What IS the Web? Mrs. Wilson Internet Basics & Beyond.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 FPGA: Field Programmable Gate Arrays Vincent Giannone Mentor: Dr. Janusz.
Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.
Education and New Technology Digital Cameras. What is a Digital Camera? Takes video, photographs, and sometimes sounds digitally by recording images through.
CCSDS Security Working Group Spring 2014 Meeting 10 November – 14 November 2014 London, England Charles Sheehe NASA/Glenn.
Introduction to Computers
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Translate the following message:
Business Computer Information Systems I.  Knowing how to use a computer is a basic skill necessary to succeed in business or to function effectively.
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
IT Introduction to Information Technology CHAPTER 01.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
“ Getting to Know Networks”. What Is a Network? A network is a collection of computers hooked up together, usually by cables or telephone wires, for the.
1 © 2015 Samsung Electronics America - Confidential SMART Signage TV: RM Series LFD and MagicInfo Express.
Chapter 1 Communication Networks and Services Network Architecture and Services.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
1 THE COMPUTER. 2 Input Processing Output Storage 4 basic functions.
Proposal for an Open Source Flash Failure Analysis Platform (FLAP) By Michael Tomer, Cory Shirts, SzeHsiang Harper, Jake Johns
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
Basic Computer Hardware and Software. Guilford County SciVis V
Basic Computer Hardware and Software.
4000 Imaje 4020 – Software Imaje 4020 – Content ■ Content of Chapter Software: 1. Flash Up 2. Netcenter 3. FTP 4. Active X 5. XCL commands 6. Exercise.
Discovering Computers 2008 Fundamentals Fourth Edition Discovering Computers 2008 Fundamentals Fourth Edition Chapter 1 Introduction to Computers.
Introduction to Networking. What is a Network? Discuss in groups.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
PCs ENVIRONMENT and PERIPHERALS Lecture 4. An expansion cards: - An expansion card (expansion board) is an electronic circuit board that adds more functionality.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Computers Mrs. Flowers University High School.
1 © 2016 Samsung Electronics America - Confidential Introducing MagicInfo Lite I 4.0.
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Basic Computer Hardware and Software.
Computer Information Systems
Firmware threat Dhaval Chauhan MIS 534.
Guide to Linux Installation and Administration, 2e
Basic Computer Hardware and Software.
Basic Computer Hardware & Software
Introduction to Networking
Introduction to Computers
Fundamentals of Information Systems
Introducing MagicInfo 6
Presentation transcript:

Anthony Karnowski

A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing—hence "field-programmable". The FPGA configuration is generally specified using a hardware description language (HDL), similar to that used for an application-specific integrated circuit.

The ability to update the functionality after shipping, partial re-configuration of a portion of the design and the low non- recurring engineering costs relative to an Application specific integrated circuit design offer advantages for many applications. Basically the time in production for using this type of controller is much shorter.

FPGA’s are widely used in all of the following industries and applications Aerospace and Defense Avionics/DO-254 MILCOM Missles & Munitions Secure Solutions Space Audio Connectivity Solutions Portable Electronics Radio Automotive High Resultion Video Image Processing Vehicle Networking and Connectivity Automotive Infotainment Broadcast Real-Time Video Engine EdgeQAM Encoders Displays Switches and Routers Consumer Electronics Digital Displays Digital Cameras Multi-function Printers Portable Electronics Set-top Boxes Data Center Servers Security Routers Switches Gateways Load Balancing High Performance Computing Servers Super Computers SIGINT Systems High-end RADARS High-end Beam Forming Systems Data Mining Systems Industrial Industrial Imaging Industrial Networking Motor Control Medical Ultrasound CT Scanner MRI X-ray PET Surgical Systems Security Industrial Imaging Secure Solutions Image Processing Video & Image Processing High Resolution Video Video Over IP Gateway Digital Displays Industrial Imaging Wired Communications Optical Transport Networks Network Processing Connectivity Interfaces Wireless Communications Baseband Connectivity Interfaces Mobile Backhaul Radio

The FPGA industry is a 2.75 billion dollar a year industry. – Considering the low cost of FPGA’s, and the fact that there are in so many devices, we will just say ALOT!! We will be looking at a specific FGPA later. – 50,000 of these units are produced a year and have been for the last 5 years. – These FPGA’s are specifically used in large format LED signage.

FPGA’s are physically vulnerable. – FPGA’s can be easily flashed by Jtag connection. – Flash protocols are some time vendor specific, we are not going to in depth. FPGA’s often have vulnerable services. – FPGA’s operating systems often offer backdoor services for re-flashing.

CompanyProductProcessor ENEA Embedded TechnologyOSEPowerPC® 405 eSOL Co., LtdPrKernel (µITRON4.0)PowerPC 405 / MicroBlaze™ Express LogicThreadX®PowerPC 405, 440 / MicroBlaze Green Hills SoftwareIntegrity®PowerPC 405, 440 LynuxWorksBlueCat LinuxPowerPC 405, 440 LynuxWorksLynuxOSPowerPC 405 Mentor Graphics ESDNucleus PlusPowerPC 405, 440 / Microblaze MicriµmµC/OS-IIPowerPC 405 / MicroBlaze MiSPONORTi/ulTRONPowerPC 405 / MicroBlaze MontaVista SoftwareMontaVista LinuxPowerPC 405, 440 PetaLogixuClinux and Petalinux 2.6MicroBlaze QNXNeutrino®PowerPC 405 Wind River SystemsVxWorks®PowerPC 405, 440 Wind River SystemsWind River GPP LinuxPowerPC 405, 440 TimesysLinuxLinkPowerPC 405, 440

FPGA’s are made by the manufacturer to be “field programmable.” – This means that usually the device can be flashed by physically connecting to the device. – Some third party operating systems allow for a flash to be reset to defaults by way of a system service. A great example would be of both would be a wireless router. – Most wireless routers have a reset button to reset the router to defaults. – Most routers also have a web-based management system that allows the same. – Most routers even have a configuration page to load firmware. – And most routers are using some sort of FPGA controller Consider that most of these third party operating systems are based on open source technologies or are freely available to users. It is pretty easy to get an understanding of vulnerabilities in a device. I would suspect that some of the students in this course have loaded third party firmware on a router at some point. When dealing with another FPGA, the ideas are no different.

External Storage in form of USB. External Storage in form of Compact Flash. External Storage in form of SD Card. FPGA Controller RJ-45 and JTAG Connection

We don’t have access to the device to Flash via the JTAG. – The controller is under lock and Key. After a couple of scans we found that our device has many services running. – FTP – HTTP for configuration – Telnet – SSH

We have guessed the root username and password for this device. We connected via telnet and can run any of the following commands from the existing Linux kernel. We have at least one storage device available to us. If this device is on a network with other computers, we will be able to mount an attack from the device. We will use wget to download the necessary packages. We will store them to external storage. We will use make and install to build source packages. We will attack the network. We will use FTP to send data collected off network. As this kernel is Linux based, we may be able to install and run a full installation of Metasploit. As this is a full Linux kernel, a worm or virus could also be ran via root privileges.

The first thing we do is create a separate user for the software package to use. We edit the software to only have access to needed services. The next thing we do is add a stronger password for the root user. We always try to present the end customer with a closed network separate from their network. If we install on the network we deny the controller access to the Internet.

Yes. Other devices have some of the same services installed and running for diagnostics and communications. FPGA’s are used in a wide variety of networking equipment. We must maintain the security of FPGA’s to maintain our networks. Please be weary.

ECEs spot FPGA security weakness; Finding may lead to new chip ID – US Military Chips "Compromised” – compromised/ compromised/ Study looks into Xilinx FPGAs' vulnerability – S S Backdoor Found (Maybe) in Chinese-Made Military Silicon Chips –