首页> 外文会议>IEEE European Test Symposium >Detection of Rowhammer Attacks in SoCs with FPGAs
【24h】

Detection of Rowhammer Attacks in SoCs with FPGAs

机译:使用FPGA检测SoC中的Rowhammer攻击

获取原文

摘要

Heterogeneous SoCs integrate FPGAs and microprocessor cores on the same fabric to accelerate applications such as cryptography and deep learning. Since FPGAs share resources with the microprocessor cores, they can launch non-cacheable SDRAM transactions through direct FPGA-to-microprocessor SDRAM interface. Therefore, if the FPGA 3rd party IPs (3PIPs) are malicious, they can launch rowhammer attacks on the SDRAM. Today's countermeasures based on performance counters cannot detect these attacks because memory transactions from FPGAs do not pass through the cache. In addition, countermeasures that count the frequency of activation of memory rows require structural changes to the memory controller or DRAM chips. Moreover, today's countermeasures cannot identify the IP that launches the attack. We present a security solution that monitors the SDRAM transactions from IPs on the FPGA to each bank of the microprocessor SDRAM through the FPGA-to-microprocessor SDRAM interface. The proposed monitor is implemented on the FPGA fabric. It can detect attempts to launch a rowhammer attack before it causes bit flips in the SDRAM. It utilizes only 1% of the adaptive logic modules (ALMs) available in an Intel Cyclone V FPGA to monitor the transactions from one IP.
机译:异构SoC将FPGA和微处理器内核集成在同一结构上,以加速诸如密码学和深度学习之类的应用。由于FPGA与微处理器内核共享资源,因此它们可以通过直接的FPGA至微处理器SDRAM接口启动不可缓存的SDRAM事务。因此,如果FPGA第三方IP(3PIP)是恶意的,则它们可以在SDRAM上发起行锤攻击。当今基于性能计数器的对策无法检测到这些攻击,因为来自FPGA的存储器事务不通过高速缓存。此外,计算内存行激活频率的对策需要对内存控制器或DRAM芯片进行结构更改。而且,当今的对策无法识别发起攻击的IP。我们提出了一种安全解决方案,该解决方案通过FPGA至微处理器SDRAM接口监视从FPGA上的IP到微处理器SDRAM的每个存储区的SDRAM事务。拟议的监控器在FPGA架构上实现。它可以检测到在SDRAM中引起位翻转之前发动行锤攻击的企图。它仅利用Intel Cyclone V FPGA中可用的自适应逻辑模块(ALM)的1%来监视来自一个IP的事务。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号