首页> 外文会议>Design, Automation and Test in Europe Conference and Exhibition >Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs
【24h】

Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs

机译:多租户FPGA中的功率分析攻击的隐身误操作

获取原文
获取外文期刊封面目录资料

摘要

FPGAs have been used in the cloud since several years, for workloads such as machine learning, database processes and security tasks. As for other cloud services, a highly desired feature is virtualization in which multiple tenants share a single FPGA to increase utilization and by that efficiency. By solely using standard FPGA logic in the untrusted tenant, on-chip logic sensors have recently been proposed, allowing remote power analysis side-channel and covert channel attacks on the victim tenant. However, such sensors are implemented by unusual circuit constructions, such as ring oscillators or delay lines, which might be easily detected by bitstream and/or netlist checking. In this paper we show that such structural checking methods are not universal solutions as the attacks can make use of “benign-looking” circuits. We demonstrate this by showing a successful Correlation Power Analysis attack on the Advanced Encryption Standard.
机译:自多年以来,FPGA已在云中使用,适用于机器学习,数据库流程和安全任务等工作负载。 至于其他云服务,高度期望的特征是虚拟化,其中多个租户共享单个FPGA以增加利用率和效率。 通过在不受信任的租户中使用标准FPGA逻辑,最近提出了片上逻辑传感器,允许远程功率分析侧通道和封面频道攻击受害者租户。 然而,这种传感器由不寻常的电路结构实现,例如环形振荡器或延迟线,其可以通过比特流和/或网表检查容易地检测。 在本文中,我们表明,这种结构检查方法不是普遍的解决方案,因为攻击可以利用“良性寻找”电路。 我们通过对先进的加密标准显示成功的相关功率分析攻击来证明这一点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号