[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3583781.3590244acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article
Open access

Exploring Remote Power Attacks Targeting Parallel Data Encryption On Multi-Tenant FPGAs

Published: 05 June 2023 Publication History

Abstract

Cloud service providers (CSPs) are increasingly incorporating Field Programmable Gate Arrays (FPGAs) into their cloud data centers due to the benefits of their flexibility and high performance in heterogeneous designs. However, the optimization of hardware resource utilization through multi-tenancy presents new security concerns. Prior research has demonstrated that remote side-channel attacks represent a significant security threat in the case of a single Advanced Encryption Standard (AES) module. However, it remains an open question whether parallel encryption can offer natural protection against Correlation Power Analysis (CPA). Our research focuses on side-channel attacks on parallel data encryption modules. We implemented delay-line based power sensors to collect mixed power traces and conducted CPA to steal the cipher key. Our results show that clocking methodology would have a significant influence on data protection. If parallel modules work at the same frequency without difference in clocking phase, the mixed voltage drops would contain sufficient information for attackers to decrypt the cipher key. Nevertheless, once the victim applies unique clocking phase to each module, he would convert voltage fluctuations from other modules into noises that offer a natural protection mechanism for parallel data encryption.

References

[1]
Karim Arabi, Resve Saleh, and Xiongfei Meng. 2007. Power Supply Noise in SoCs: Metrics, Management, and Measurement. IEEE Design & Test of Computers, Vol. 24, 3 (2007), 236--244. https://doi.org/10.1109/MDT.2007.79
[2]
Mihir Bellare, Krzysztof Pietrzak, and Phillip Rogaway. 2005. Improved Security Analyses for CBC MACs. In Advances in Cryptology -- CRYPTO 2005 (Lecture Notes in Computer Science, Vol. 3621). Springer-Verlag, 527--545.
[3]
Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation Power Analysis with a Leakage Model. In Cryptographic Hardware and Embedded Systems - CHES 2004, Marc Joye and Jean-Jacques Quisquater (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 16--29.
[4]
Ghada Dessouky, Ahmad-Reza Sadeghi, and Shaza Zeitouni. 2021. SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities. In 2021 IEEE European Symposium on Security and Privacy (EuroS&P). 487--506. https://doi.org/10.1109/EuroSP51992.2021.00040
[5]
Ognjen Glamočanin, Louis Coulon, Francesco Regazzoni, and Mirjana Stojilović. 2020. Are Cloud FPGAs Really Vulnerable to Power Analysis Attacks?. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE). 1007--1010. https://doi.org/10.23919/DATE48585.2020.9116481
[6]
Dennis R. E. Gnad, Vincent Meyers, Nguyen Minh Dang, Falk Schellenberg, Amir Moradi, and Mehdi B. Tahoori. 2021. Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs. In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). 1012--1015. https://doi.org/10.23919/DATE51398.2021.9473938
[7]
Tim Güneysu and Amir Moradi. 2011. Generic Side-Channel Countermeasures for Reconfigurable Devices. In Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems (Nara, Japan) (CHES'11). Springer-Verlag, Berlin, Heidelberg, 33--48.
[8]
A. Harma and T. Paatero. 2001. Discrete representation of signals on a logarithmic frequency scale. In Proceedings of the 2001 IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics (Cat. No.01TH8575). 39--42. https://doi.org/10.1109/ASPAA.2001.969537
[9]
Patrick Koeberl. 2020. Multi-Tenant FPGA Security: Challenges and Opportunities. In Proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (Seaside, CA, USA) (FPGA '20). Association for Computing Machinery, New York, NY, USA, 23. https://doi.org/10.1145/3373087.3375882
[10]
Jonas Krautter, Dennis R.E. Gnad, Falk Schellenberg, Amir Moradi, and Mehdi B. Tahoori. 2019. Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs. In 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 1--8. https://doi.org/10.1109/ICCAD45719.2019.8942094
[11]
Subhi R. M. Zeebaree, Amira B. Sallow, Bzar Khidir Hussan, and Sundos Mohammad Ali. 2019. Design and Simulation of High-Speed Parallel/Sequential Simplified DES Code Breaking Based on FPGA. In 2019 International Conference on Advanced Science and Engineering (ICOASE). 76--81. https://doi.org/10.1109/ICOASE.2019.8723792
[12]
Steven McNeil. 2020. FPGA / SoC Security: Arms Race in the Cloud. In Proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (Seaside, CA, USA) (FPGA '20). Association for Computing Machinery, New York, NY, USA, 24--25. https://doi.org/10.1145/3373087.3377368
[13]
Cliff Wang Mohammad Tehranipoor (Ed.). 2021. Introduction to Hardware Security and Trust. Springer New York, NY.
[14]
Falk Schellenberg, Dennis R.E. Gnad, Amir Moradi, and Mehdi B. Tahoori. 2018. An inside job: Remote power analysis attacks on FPGAs. In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). 1111--1116. https://doi.org/10.23919/DATE.2018.8342177
[15]
Xilinx UG1291. 2020. Vivado Isolation Verifier. https://china.xilinx.com/applications/isolation-design-flow.html.
[16]
Kenneth M. Zick, Meeta Srivastav, Wei Zhang, and Matthew French. 2013. Sensing Nanosecond-Scale Voltage Attacks and Natural Transients in FPGAs (FPGA '13). Association for Computing Machinery, New York, NY, USA, 101--104. https://doi.org/10.1145/2435264.2435283

Cited By

View all

Index Terms

  1. Exploring Remote Power Attacks Targeting Parallel Data Encryption On Multi-Tenant FPGAs

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GLSVLSI '23: Proceedings of the Great Lakes Symposium on VLSI 2023
    June 2023
    731 pages
    ISBN:9798400701252
    DOI:10.1145/3583781
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 June 2023

    Check for updates

    Author Tags

    1. correlation power analysis
    2. multi-tenant fpga
    3. parallel encryption
    4. remote side-channel attack

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China

    Conference

    GLSVLSI '23
    Sponsor:
    GLSVLSI '23: Great Lakes Symposium on VLSI 2023
    June 5 - 7, 2023
    TN, Knoxville, USA

    Acceptance Rates

    Overall Acceptance Rate 312 of 1,156 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 187
      Total Downloads
    • Downloads (Last 12 months)117
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media