Production programming process prevents FPGA IP pilfering

March 16, 2016 // By Graham Prophet
Microsemi has set up Secured Production Programming Solution (SPPS) for its FPGAs, as a guard against overbuilding, cloning, reverse engineering, malware insertion and other security threats; the company presents it as giving supply chain assurance and control over the number of devices programmed.

The programme securely generates and injects cryptographic keys and configuration bitstreams into Microsemi's FPGAs thus preventing cloning, reverse engineering, malware insertion, leakage of sensitive intellectual property (IP) such as trade secrets or classified data, overbuilding and other security threats.

 

Microsemi's SPPS includes the use of "customer" and "manufacturer" hardware security modules (HSMs) combined with Microsemi firmware, the company's new SPPS Job Manager software and advanced security protocols built into every Microsemi SmartFusion2 system-on-chip (SoC) FPGA and IGLOO2 FPGA. SPPS allows customers to automatically prevent security threats by external adversaries or competitors, contract manufacturers and their employees, or other insiders. SPPS is offered for any FPGA-based system that may be at risk for overbuilding in a wide variety of applications in the communications, defence, industrial and automotive markets. It allows users to safely use less expensive manufacturing resources such as offshore contract manufacturers, while reducing security risks, the company adds.

 

Key security features of the SPPS include:

· Prevents overbuilding and cloning

· Provides a secure audit trail of devices programmed and programming content

· Provides counterfeit part detection

· Secured key management (generation/storage/use)

· Secure field-upgrade file generation

 

Microsemi; www.microsemi.com/products/fpga-soc/design-resources/programming/spps

 

next page; SPPS detail...