YoVDO

Capture This - Real Time Packet Processing With FPGAs

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses FPGA Courses Encryption Courses Von Neumann Architecture Courses Network Engineering Courses

Course Description

Overview

Explore real-time packet processing using FPGAs in this comprehensive conference talk from the Hack In The Box Security Conference. Dive into the limitations of Von Neumann architecture and discover how FPGAs offer a non-Von Neumann approach to overcome bottlenecks. Learn about FPGA internals, Xilinx fabric families, and the ZYNQ architecture. Examine useful libraries for implementing network applications and understand routing network connections. Delve into Gigabit Ethernet MAC and timing constraints as you work towards a fully hardware implementation. Investigate Ethernet at the ground level using conveyor belt and assembly chain models. Analyze Ethernet frame structure, preamble detection, and MAC and EtherType filters. Explore search algorithms, encryption environments, and witness demonstrations of MAC filtering, encryption, and decryption. Gain insights into achievements and future upgrades in FPGA-based packet processing.

Syllabus

Intro
About me
Outline
Ethernet connections run at 1Gbps commonly
Von Neumann architecture
Von Neumann Bottleneck
FPGAS: a Non-Von Neumann class of devices
FPGAs: what's inside
FPGAs: Xilinx fabric families
Summarizing
Carrier Evaluation Kit
ZYNQ architecture
Useful libraries to implement network applications
Routing Network Connections
Gigabit Ethernet MAC
Towards a fully hardware implementation
Timing Constraints - Dependencies
Primary goal: the Ethernet extension cord
FPGA expansion modules
Ethernet at "ground" level
Conveyor belt model
Network Packets
Assembly chain model
Ethernet Frame structure
Preamble detector
MAC and EtherType filters - Preparation
MAC address
Search Algorithm version 1-tricotomic
MAC filter state machine
MAC and EtherType filters configuration
Demo: MAC filtering
MAC filter conclusions
EtherType filter configuration
Search Algorithm version 2
Encryption Environment
Encryption configuration
Encryption schema
Encryption architecture - "Signature"
Demo: Encryption
Demo: Decryption
Moving towards a higher level...
Achievements
Future Upgrades
Questions?
Checksum generation


Taught by

Hack In The Box Security Conference

Related Courses

计算机组成 Computer Organization
Peking University via Coursera
系统平台与计算环境
Xi'an Jiaotong University via Coursera
Architettura degli elaboratori
University of Urbino via EMMA
Computer Organization and Architecture
YouTube
Live Forensics: Principles and Techniques
Bill Buchanan OBE via YouTube