首页> 外文会议>International Conference on Field Programmable Logic and Applications >X-Attack: Remote Activation of Satisfiability Don't-Care Hardware Trojans on Shared FPGAs
【24h】

X-Attack: Remote Activation of Satisfiability Don't-Care Hardware Trojans on Shared FPGAs

机译:X-Attack:远程激活可满足性,无需在共享FPGA上维护硬件木马

获取原文

摘要

Albeit very appealing, FPGA multitenancy in the cloud computing environment is currently on hold due to a number of recently discovered vulnerabilities to side-channel attacks and covert communication. In this work, we successfully demonstrate a new attack scenario on shared FPGAs: we show that an FPGA tenant can activate a dormant hardware Trojan without any physical or logical connection to the private Trojan-infected FPGA circuit. Our victim contains a so-called satisfiability don't-care Trojan, activated by a pair of don't-care signals, which never reach the combined trigger condition under normal operation. However, once a malicious FPGA user starts to induce considerable fluctuations in the on-chip signal delays—and, consequently, the timing faults-these harmless don't-care signals take unexpected values which trigger the Trojan. Our attack model eliminates the assumption on physical access to or manipulation of the victim design. Contrary to existing fault and side-channel attacks that target unprotected cryptographic circuits, our new attack is shown effective even against provably well-protected cryptographic circuits. Besides demonstrating the attack by successfully leaking the entire cryptographic key from one unprotected and one masked AES S-box implementation, we present an efficient and lightweight countermeasure.
机译:尽管非常吸引人,但由于最近发现了许多对边信道攻击和秘密通信的漏洞,因此云计算环境中的FPGA多租户目前处于暂停状态。在这项工作中,我们成功地演示了在共享FPGA上的新攻击场景:我们展示了FPGA租户可以激活休眠的硬件特洛伊木马,而无需与感染特洛伊木马的专用FPGA电路进行任何物理或逻辑连接。我们的受害者包含一个所谓的“可忽略不计”特洛伊木马,它由一对“忽略”信号激活,这些信号在正常操作下永远不会达到组合的触发条件。但是,一旦恶意的FPGA用户开始在片上信号延迟中引起可观的波动,进而导致时序错误,这些无害的信号将触发木马程序,产生意想不到的值。我们的攻击模型消除了对受害者设计进行物理访问或操纵的假设。与针对未受保护的加密电路的现有故障和侧信道攻击相反,我们的新攻击显示出即使对可证明受到良好保护的加密电路也有效。除了通过从一个不受保护的和一个受掩蔽的AES S-box实现中成功泄漏整个加密密钥来演示攻击之外,我们还提供了一种有效且轻量级的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号