Remote Side-Channel Attacks on Heterogeneous SoC

被引:23
作者
Gravellier, Joseph [1 ,2 ]
Dutertre, Jean-Max [1 ]
Teglia, Yannick [2 ]
Moundi, Philippe Loubet [2 ]
Olivier, Francis [2 ]
机构
[1] Ctr CMP, CEA Tech, Mines St Etienne, F-13541 Gardanne, France
[2] Thales, F-13600 La Ciotat, France
来源
SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019 | 2020年 / 11833卷
关键词
SoC; Remote attacks; FPGA; Time-to-digital converter; Voltage sensing; Side-channel attacks;
D O I
10.1007/978-3-030-42068-0_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Thanks to their performance and flexibility, FPGAs are increasingly adopted for hardware acceleration on various platforms such as system on chip and cloud datacenters. Their use for commercial and industrial purposes raises concern about potential hardware security threats. By getting access to the FPGA fabric, an attacker could implement malicious logic to perform remote hardware attacks. Recently, several papers demonstrated that FPGA can be used to eavesdrop or disturb the activity of resources located within and outside the chip. In a complex SoC that contains a processor and a FPGA within the same die, we experimentally demonstrate that FPGA-based voltage sensors can eavesdrop computations running on the CPU and that advanced side-channel attacks can be conducted remotely to retrieve the secret key of a symmetric crypto-algorithm.
引用
收藏
页码:109 / 125
页数:17
相关论文
共 23 条
[1]  
[Anonymous], 2018, Deep Dive into Alibaba Cloud F3 FPGA as a Service Instances
[2]  
[Anonymous], 2018, SPECTRE ATTACKS EXPL
[3]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[4]  
Chen F, 2014, ACM COMPUTING FRONTI
[5]  
Daemen J, 2000, LECT NOTES COMPUT SC, V1820, P277
[6]  
Dutertre J.-M., 2012, DESIGN CIRCUITS INTE
[7]   An Experimental Evaluation and Analysis of Transient Voltage Fluctuations in FPGAs [J].
Gnad, Dennis R. E. ;
Oboril, Fabian ;
Kiamehr, Saman ;
Tahoori, Mehdi B. .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 26 (10) :1817-1830
[8]  
Gnad DRE, 2017, I C FIELD PROG LOGIC
[9]  
Kim Y, 2014, CONF PROC INT SYMP C, P361, DOI 10.1109/ISCA.2014.6853210
[10]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388