C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage

被引:46
作者
Giechaskiel, Ilias [1 ]
Rasmussen, Kasper Bonne [1 ]
Szefer, Jakub [2 ]
机构
[1] Univ Oxford, Oxford, England
[2] Yale Univ, New Haven, CT USA
来源
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) | 2020年
关键词
Power supply units; voltage regulators; ring oscillators; FPGAs; covert channels; power attacks;
D O I
10.1109/SP40000.2020.00070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits that can be used as hardware accelerators to process highly-sensitive data. Leaking this data and associated cryptographic keys, however, can undermine a system's security. To prevent potentially unintentional interactions that could break separation of privilege between different data center tenants, FPGAs in cloud environments are currently dedicated on a per-user basis. Nevertheless, while the FPGAs themselves are not shared among different users, other parts of the data center infrastructure are. This paper specifically shows for the first time that powering FPGAs, CPUs, and GPUs through the same power supply unit (PSU) can be exploited in FPGA-to-FPGA, CPU-to-FPGA, and GPU-to-FPGA covert channels between independent boards. These covert channels can operate remotely, without the need for physical access to, or modifications of, the boards. To demonstrate the attacks, this paper uses a novel combination of "sensing" and "stressing" ring oscillators as receivers on the sink FPGA. Further, ring oscillators are used as transmitters on the source FPGA. The transmitting and receiving circuits are used to determine the presence of the leakage on off-the-shelf Xilinx boards containing Artix 7 and Kintex 7 FPGA chips. Experiments are conducted with PSUs by two vendors, as well as CPUs and GPUs of different generations. Moreover, different sizes and types of ring oscillators are also tested. In addition, this work discusses potential countermeasures to mitigate the impact of the cross-board leakage. The results of this paper highlight the dangers of shared power supply units in local and cloud FPGAs, and therefore a fundamental need to re-think FPGA security for shared infrastructures.
引用
收藏
页码:1728 / 1741
页数:14
相关论文
共 48 条
[1]  
Alagappan M., 2017, VERY LARGE SCALE INT
[2]  
Amazon Web Services, AM EC2 F1 INST
[3]  
Amazon Web Services, AWS EC2 FPGA HDK SDK
[4]  
[Anonymous], 2017, USENIX SEC S
[5]  
[Anonymous], 2011, FIELD PROGRAMMABLE G
[6]  
[Anonymous], 2018, ARXIV180404014
[7]  
[Anonymous], 2017, APPL CRYPTOGRAPHY NE
[8]   On the Capacity of Thermal Covert Channels in Multicores [J].
Bartolini, Davide B. ;
Miedl, Philipp ;
Thiele, Lothar .
PROCEEDINGS OF THE ELEVENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS, (EUROSYS 2016), 2016,
[9]   Hardware masking, revisited [J].
De Cnudde T. ;
Ender M. ;
Moradi A. .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, 2018 (02) :123-148
[10]  
Corsair, PROF SER GOLD AX850