{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T03:42:56Z","timestamp":1773200576298,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134039","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1661-1674","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":92,"title":["On the Power of Optical Contactless Probing"],"prefix":"10.1145","author":[{"given":"Shahin","family":"Tajik","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Heiko","family":"Lohrke","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Christian","family":"Boit","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Amazon Web Services","author":"Amazon","year":"2017","unstructured":"Amazon 2017. Amazon Web Services, Inc.. https:\/\/aws.amazon.com\/ec2\/instance-types\/f1\/ [accessed 19 May 2017]."},{"key":"e_1_3_2_2_2_1","volume-title":"Backside Protection Structure for Security Sensitive ICs 43rd International Symposium for Testing and Failure Analysis (November 5-9","author":"Amini Elham","year":"2017","unstructured":"Elham Amini, Ruslan Muydinov, Bernd Szyszka, and Christian Boit 2017. Backside Protection Structure for Security Sensitive ICs 43rd International Symposium for Testing and Failure Analysis (November 5-9, 2017). Asm."},{"key":"e_1_3_2_2_3_1","volume-title":"2016 IEEE 23rd International Symposium on the. IEEE, 365--369","author":"Boit Christian","year":"2016","unstructured":"Christian Boit, Shahin Tajik, Philipp Scholz, Elham Amini, Anne Beyreuther, Heiko Lohrke, and Jean-Pierre Seifert 2016. From IC Debug to Hardware Security Risk: The Power of Backside Access and Optical Interaction Physical and Failure Analysis of Integrated Circuits (IPFA), 2016 IEEE 23rd International Symposium on the. IEEE, 365--369."},{"key":"e_1_3_2_2_4_1","volume-title":"pycrypto 2.6.1. https:\/\/pypi.python.org\/pypi\/pycrypto [accessed","author":"Foundation Python Software","year":"2017","unstructured":"Python Software Foundation. 2017. pycrypto 2.6.1. https:\/\/pypi.python.org\/pypi\/pycrypto [accessed 19 May 2017]."},{"key":"e_1_3_2_2_5_1","volume-title":"Electromagnetic Side-channel Attack against 28-nm FPGA Device. Pre-proceedings of WISA","author":"Hori Yohei","year":"2012","unstructured":"Yohei Hori, Toshihiro Katashita, Akihiko Sasaki, and Akashi Satoh 2012. Electromagnetic Side-channel Attack against 28-nm FPGA Device. Pre-proceedings of WISA (2012)."},{"key":"e_1_3_2_2_6_1","volume-title":"Skoll - Kintex 7 FPGA Development Board. https:\/\/numato.com\/skoll-kintex-7-fpga-development-board\/ [accessed","author":"Lab Numato","year":"2017","unstructured":"Numato Lab. 2017. Skoll - Kintex 7 FPGA Development Board. https:\/\/numato.com\/skoll-kintex-7-fpga-development-board\/ [accessed 19 May 2017]."},{"key":"e_1_3_2_2_7_1","volume-title":"No Place to Hide: Contactless Probing of Secret Data on FPGAs. Cryptographic Hardware and Embedded Systems--CHES","author":"Lohrke Heiko","year":"2016","unstructured":"Heiko Lohrke, Shahin Tajik, Christian Boit, and Jean-Pierre Seifert 2016. No Place to Hide: Contactless Probing of Secret Data on FPGAs. Cryptographic Hardware and Embedded Systems--CHES 2016. Springer, 147--168."},{"key":"e_1_3_2_2_8_1","volume-title":"http:\/\/www.inscopelabs.com [accessed","author":"Inscope Labs PTE LTD.","year":"2017","unstructured":"Inscope Labs PTE LTD. 2017. http:\/\/www.inscopelabs.com [accessed 19 May 2017]. (2017)."},{"key":"e_1_3_2_2_9_1","volume-title":"Differential Power Analysis Countermeasures for the Configuration of SRAM FPGAs Military Communications Conference, MILCOM 2015--2015 IEEE. IEEE, 1276--1283","author":"Luis William","year":"2015","unstructured":"William Luis, G Richard Newell, and Kenneth Alexander. 2015. Differential Power Analysis Countermeasures for the Configuration of SRAM FPGAs Military Communications Conference, MILCOM 2015--2015 IEEE. IEEE, 1276--1283."},{"key":"e_1_3_2_2_10_1","volume-title":"Microsoft Bets Its Future on a Reprogrammable Computer Chip. https:\/\/www.wired.com\/2016\/09\/microsoft-bets-future-chip-reprogram-fly\/ [accessed","author":"Metz Cade","year":"2017","unstructured":"Cade Metz. 2016. Microsoft Bets Its Future on a Reprogrammable Computer Chip. https:\/\/www.wired.com\/2016\/09\/microsoft-bets-future-chip-reprogram-fly\/ [accessed 19 May 2017]. Wired."},{"key":"e_1_3_2_2_11_1","volume-title":"Rump Session CHES","author":"Moradi Amir","year":"2013","unstructured":"Amir Moradi. 2013. Altera vs. Xilinx: Which One Keeps Your Design Hidden?. https:\/\/www.emsec.rub.de\/media\/attachments\/files\/2016\/05\/AmirTalk_2013-08-22-CHES-Rump.pdf]. Rump Session CHES 2013."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Amir Moradi Alessandro Barenghi Timo Kasper and Christof Paar 2011. On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks: Extracting Keys from Xilinx Virtex-II FPGAs Proceedings of the 18th ACM conference on Computer and communications security. ACM 111--124.","DOI":"10.1145\/2046707.2046722"},{"key":"e_1_3_2_2_13_1","first-page":"1","article-title":"Black-Box Side-channel Attacks Highlight the Importance of Countermeasures","volume":"2012","author":"Moradi Amir","year":"2012","unstructured":"Amir Moradi, Markus Kasper, and Christof Paar. 2012. Black-Box Side-channel Attacks Highlight the Importance of Countermeasures. Topics in Cryptology--CT-RSA 2012, 1--18.","journal-title":"Topics in Cryptology--CT-RSA"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Amir Moradi David Oswald Christof Paar and Pawel Swierczynski 2013. Side-Channel Attacks on the Bitstream Encryption Mechanism of Altera Stratix II: Facilitating Black-Box Analysis using Software Reverse-Engineering Proceedings of the ACM\/SIGDA international symposium on Field programmable gate arrays. ACM 91--100.","DOI":"10.1145\/2435264.2435282"},{"key":"e_1_3_2_2_15_1","volume-title":"Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. Constructive Side-Channel Analysis and Secure Design -- COSADE","author":"Moradi Amir","year":"2016","unstructured":"Amir Moradi and Tobias Schneider 2016. Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. Constructive Side-Channel Analysis and Secure Design -- COSADE 2016. Springer."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.19"},{"key":"e_1_3_2_2_17_1","unstructured":"Ed Peterson. 2015. White Paper WP468: Leveraging Asymmetric Authentication to Enhance Security-Critical Applications Using Zynq-7000 All Programmable SoCs. http:\/\/www.xilinx.com\/support\/documentation\/white_papers\/wp468_asym-auth-zynq-7000.pdf [accessed 21 Jan 2016]. Xilinx Inc. San Jose CA (2015)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btp184"},{"key":"e_1_3_2_2_19_1","unstructured":"Presto Engineering Inc. 2017. http:\/\/www.presto-eng.com [accessed 19 May 2017]. (2017)."},{"key":"e_1_3_2_2_20_1","volume-title":"Breakthrough Silicon Scanning Discovers Backdoor in Military Chip International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 23--40","author":"Skorobogatov Sergei","year":"2012","unstructured":"Sergei Skorobogatov and Christopher Woods 2012. Breakthrough Silicon Scanning Discovers Backdoor in Military Chip International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 23--40."},{"key":"e_1_3_2_2_21_1","first-page":"4","article-title":"Physical Security Evaluation of the Bitstream Encryption mechanism of Altera Stratix II and Stratix III FPGAs","volume":"7","author":"Swierczynski Pawel","year":"2015","unstructured":"Pawel Swierczynski, Amir Moradi, David Oswald, and Christof Paar 2015. Physical Security Evaluation of the Bitstream Encryption mechanism of Altera Stratix II and Stratix III FPGAs. ACM Transactions on Reconfigurable Technology and Systems (TRETS), Vol. 7, 4, 34.","journal-title":"ACM Transactions on Reconfigurable Technology and Systems (TRETS)"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2017.8046216"},{"key":"e_1_3_2_2_23_1","volume-title":"Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market","author":"Tehranipoor Mark M.","unstructured":"Mark M. Tehranipoor, Ujjwal Guin, and Swarup Bhunia. 2017. Invasion of the Hardware Snatchers: Cloned Electronics Pollute the Market. IEEE Spectrum."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2331672"},{"key":"e_1_3_2_2_25_1","volume-title":"The Hidden Dangers of Chop-Shop Electronics: Clever Counterfeiters Sell Old Components as New Threatening both Military and Commercial Systems","author":"Villasenor John","unstructured":"John Villasenor and Mohammad Tehranipoor 2013. The Hidden Dangers of Chop-Shop Electronics: Clever Counterfeiters Sell Old Components as New Threatening both Military and Commercial Systems. IEEE Spectrum (cover story)."},{"key":"e_1_3_2_2_26_1","volume-title":"Fourier transform. Wolfram Research","author":"Weisstein Eric W","unstructured":"Eric W Weisstein. 2004. Fourier transform. Wolfram Research, Inc.."},{"key":"e_1_3_2_2_27_1","volume-title":"Using Encryption to Secure a 7 Series FPGA Bitstream. https:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp1239-fpga-bitstream-encryption.pdf [accessed","author":"Wilkinson Kyle","year":"2017","unstructured":"Kyle Wilkinson. 2015. Using Encryption to Secure a 7 Series FPGA Bitstream. https:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp1239-fpga-bitstream-encryption.pdf [accessed 19 May 2017]. Xilinx, Inc. San Jose, CA."},{"key":"e_1_3_2_2_28_1","volume-title":"7 Series FPGAs Configuration User Guide. https:\/\/www.xilinx.com\/support\/documentation\/user_guides\/ug470_7Series_Config.pdf [accessed","author":"Xilinx","year":"2017","unstructured":"Xilinx 2016. 7 Series FPGAs Configuration User Guide. https:\/\/www.xilinx.com\/support\/documentation\/user_guides\/ug470_7Series_Config.pdf [accessed 19 May 2017]. Xilinx, Inc. San Jose, CA."},{"key":"e_1_3_2_2_29_1","volume-title":"7 Series FPGAs GTX\/GTH Transceivers. https:\/\/www.xilinx.com\/support\/documentation\/user_guides\/ug476_7Series_Transceivers.pdf [accessed","author":"Xilinx","year":"2017","unstructured":"Xilinx 2016. 7 Series FPGAs GTX\/GTH Transceivers. https:\/\/www.xilinx.com\/support\/documentation\/user_guides\/ug476_7Series_Transceivers.pdf [accessed 19 May 2017]. Xilinx, Inc. San Jose, CA."},{"key":"e_1_3_2_2_30_1","volume-title":"Using SPI Flash with 7 Series FPGAs. https:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp586-spi-flash.pdf [accessed","author":"Yang Arthur","year":"2017","unstructured":"Arthur Yang. 2016. Using SPI Flash with 7 Series FPGAs. https:\/\/www.xilinx.com\/support\/documentation\/application_notes\/xapp586-spi-flash.pdf [accessed 19 May 2017]. Xilinx, Inc. San Jose, CA."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134039"}},"subtitle":["Attacking Bitstream Encryption of FPGAs"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":30,"alternative-id":["10.1145\/3133956.3134039","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134039","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}