Isolation design flow effectiveness evaluation methodology for zynq SoCs

Arsalan Ali Malik, Anees Ullah*, Ali Zahir, Affaq Qamar, Shadan Khan Khattak, Pedro Reviriego

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

Static Random-Access Memory (SRAM)-based Field Programmable Gate Arrays (FPGAs) are increasingly being used in many application domains due to their higher logic density and reconfiguration capabilities. However, with state-of-the-art FPGAs being manufactured in the latest technology nodes, reliability is becoming an important issue, particularly for safety-critical avionics, automotive, aerospace, industrial robotics, medical, and financial systems. Therefore, fault tolerant system design methodologies have become essential in the aforementioned application domains. The Isolation Design Flow (IDF) is one such design methodology that has promising prospects due to its ability to isolate logic design modules at the physical level for fault containment purposes. This paper proposes a methodology to evaluate the effectiveness of the IDF. To do so, reverse engineering is used to enable fault injection on the IDF designs with minimal changes in the bit-stream. This reduces the time needed to inject a fault significantly thus accelerating the evaluation process. Then this methodology is applied to a case study of a single-chip cryptography application on a ZynQ SoC. Specifically, an Advanced Encryption Standard (AES) Duplication With Comparison (DWC) design is physically isolated with IDF and subsequently subjected to frame-level Fault Injection (FI) in the configuration memory.

Original languageEnglish
Article number814
JournalElectronics (Switzerland)
Volume9
Issue number5
DOIs
Publication statusPublished - 15 May 2020
Externally publishedYes

Keywords

  • Design failure
  • FPGAs
  • Fault injection
  • Isolation design flow
  • Processor configuration access port (PCAP)

Cite this