Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era

被引:14
作者
Mahmoud, Dina G. [1 ]
Lenders, Vincent [2 ,3 ]
Stojilovic, Mirjana [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland
[2] Armasuisse, Bern, Switzerland
[3] Armasuisse Sci & Technol, Cyber Def Campus, Feuerwerkerstr 39, CH-3602 Thun, Switzerland
关键词
Electrical-level attacks; heterogeneous computing systems; CPU; FPGA; GPU; SIDE-CHANNEL ANALYSIS; POWER-ANALYSIS ATTACKS; FAULT INJECTION; VOLTAGE; GLITCH; IMPLEMENTATIONS; EXECUTION; AES;
D O I
10.1145/3498337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Given the need for efficient high-performance computing, computer architectures combining central processing units (CPUs), graphics processing units (GPUs), and field-programmable gate arrays (FPGAs) are currently prevalent. However, each of these components suffers from electrical-level security risks. Moving to heterogeneous systems, with the potential of multitenancy, it is essential to understand and investigate how the security vulnerabilities of individual components may affect the system as a whole. In this work, we provide a survey on the electrical-level attacks on CPUs, FPGAs, and GPUs. Additionally, we discuss whether these attacks can extend to heterogeneous systems and highlight open research directions for ensuring the security of heterogeneous computing systems in the future.
引用
收藏
页数:40
相关论文
共 242 条
[81]   Remote Side-Channel Attacks on Heterogeneous SoC [J].
Gravellier, Joseph ;
Dutertre, Jean-Max ;
Teglia, Yannick ;
Moundi, Philippe Loubet ;
Olivier, Francis .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 :109-125
[82]   LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations [J].
Grosso, Vincent ;
Leurent, Gaetan ;
Standaert, Francois-Xavier ;
Varici, Kerem .
FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 :18-37
[83]  
Grossschadl Johann, 2009, Information Security and Cryptology, ICISC 2009. 12th International Conference, ICISC 2009. Revised Selected Papers, P176
[84]  
Gruss Daniel, 2016, Detection of Intrusions and Malware, and Vulnerability Assessment. 13th International Conference, DIMVA 2016. Proceedings: LNCS 9721, P300, DOI 10.1007/978-3-319-40667-1_15
[85]  
Güneysu T, 2011, LECT NOTES COMPUT SC, V6917, P33, DOI 10.1007/978-3-642-23951-9_3
[86]   Harnessing CPU Electromagnetic Emanations for Resonance-Induced Voltage-Noise Characterization [J].
Hadjilambrou, Zacharias ;
Das, Shidhartha ;
Antoniades, Marco A. ;
Sazeides, Yiannakis .
IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (09) :1338-1349
[87]  
Hailong L., 2017, J. Electrotechnol., Elect. Eng. Manage., V1, P23
[88]   Side-Channel-Based Code-Execution Monitoring Systems A survey [J].
Han, Yi ;
Christoudis, Ioannis ;
Diamantaras, Konstantinos I. ;
Zonouz, Saman ;
Petropulu, Athina .
IEEE SIGNAL PROCESSING MAGAZINE, 2019, 36 (02) :22-35
[89]   Applications of machine learning techniques in side-channel attacks: a survey [J].
Hettwer, Benjamin ;
Gehrer, Stefan ;
Gueneysu, Tim .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) :135-162
[90]  
Heuser Annelie, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P249, DOI 10.1007/978-3-642-29912-4_18