Loading…

Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs

FPGAs have been used in the cloud since several years, for workloads such as machine learning, database processes and security tasks. As for other cloud services, a highly desired feature is virtualization in which multiple tenants share a single FPGA to increase utilization and by that efficiency....

Full description

Saved in:
Bibliographic Details
Main Authors: Gnad, Dennis R. E., Meyers, Vincent, Dang, Nguyen Minh, Schellenberg, Falk, Moradi, Amir, Tahoori, Mehdi B.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:FPGAs have been used in the cloud since several years, for workloads such as machine learning, database processes and security tasks. As for other cloud services, a highly desired feature is virtualization in which multiple tenants share a single FPGA to increase utilization and by that efficiency. By solely using standard FPGA logic in the untrusted tenant, on-chip logic sensors have recently been proposed, allowing remote power analysis side-channel and covert channel attacks on the victim tenant. However, such sensors are implemented by unusual circuit constructions, such as ring oscillators or delay lines, which might be easily detected by bitstream and/or netlist checking. In this paper we show that such structural checking methods are not universal solutions as the attacks can make use of "benign-looking" circuits. We demonstrate this by showing a successful Correlation Power Analysis attack on the Advanced Encryption Standard.
ISSN:1558-1101
DOI:10.23919/DATE51398.2021.9473938