Review of Side Channel Attacks and Countermeasures of FPGA Based Systems

被引:2
作者
Koh, Jun Yu [1 ]
Kumar, T. Nandha [2 ]
机构
[1] Univ Nottingham, Elect & Elect Engn Dept, Malaysia Campus, Semenyih, Malaysia
[2] Univ Nottingham Malaysia, Dept Elect & Elect Engn, Semenyih, Malaysia
来源
19TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED 2021) | 2021年
关键词
FPGA; Side channel attacks; Multi-tenant; Power attack; Long wire leakage;
D O I
10.1109/SCOReD53546.2021.9652773
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Field Programmable Gate Arrays (FPGAs) based systems are widely used in a range of applications including cryptography and machine learning model due to the rapid rate of hardware realizations at low cost. However, FPGAs based systems are subjected to vulnerabilities due to the side channel attacks. Recent studies have shown that vulnerabilities such as power leakage and long wires leakage can be utilised to extract secret key or information from the FPGAs. Which becomes a critical security concern for the data and Machine Learning model executing on the cloud computing service and data centres that includes FPGAs in their systems. Malicious users in these systems may utilised these vulnerabilities to perform a power side channel attacks to get confidential information or to create a malicious shutdown attack towards the systems. In this review paper, we presented the most recent side channel attacks focusing on power leakage and long wire leakage. Moreover, we present the countermeasures for protecting FPGAs from these attacks.
引用
收藏
页码:102 / 107
页数:6
相关论文
共 26 条
[1]   A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography [J].
Al Hasib, Abdullah ;
Haque, Abul Ahsan Md. Mahmudul .
THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, :505-510
[2]   Scalable Application-Dependent Diagnosis of Interconnects of SRAM-Based FPGAs [J].
Almurib, Haider A. F. ;
Kumar, T. Nandha ;
Lombardi, Fabrizio .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (06) :1540-1550
[3]   A Single-Configuration Method for Application-Dependent Testing of SRAM-based FPGA Interconnects [J].
Almurib, Haider A. F. ;
Kumar, T. Nandha ;
Lombardi, Fabrizio .
2011 20TH ASIAN TEST SYMPOSIUM (ATS), 2011, :444-450
[4]   Neighbors From Hell: Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs [J].
Boutros, Andrew ;
Hall, Mathew ;
Papernot, Nicolas ;
Betz, Vaughn .
2020 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT 2020), 2020, :103-111
[5]   Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks [J].
Dao, Ba-Anh ;
Hoang, Trong-Thuc ;
Le, Anh-Tien ;
Tsukamoto, Akira ;
Suzaki, Kuniyasu ;
Pham, Cong-Kha .
IEEE ACCESS, 2021, 9 (09) :24768-24786
[6]  
Elnaggar R, 2019, DES AUT TEST EUROPE, P7, DOI [10.23919/date.2019.8714904, 10.23919/DATE.2019.8714904]
[7]   C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage [J].
Giechaskiel, Ilias ;
Rasmussen, Kasper Bonne ;
Szefer, Jakub .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1728-1741
[8]   Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs [J].
Giechaskiel, Ilias ;
Rasmussen, Kasper Bonne ;
Szefer, Jakub .
2019 29TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2019, :45-50
[9]   Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires [J].
Giechaskiel, Ilias ;
Rasmussen, Kasper B. ;
Eguro, Ken .
PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, :15-27
[10]  
Glamocanin O, 2020, DES AUT TEST EUROPE, P1007, DOI 10.23919/DATE48585.2020.9116481