Temperature Impact on Remote Power Side-Channel Attacks on Shared FPGAs

被引:1
|
作者
Glamocanin, Ognjen [1 ]
Bazaz, Hajira [1 ]
Payer, Mathias [1 ]
Stojilovic, Mirjana [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Lausanne, Switzerland
基金
瑞士国家科学基金会;
关键词
FPGA; multitenancy; machine learning; side-channel attacks; temperature;
D O I
10.23919/DATE56975.2023.10136979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To answer the growing demand for hardware acceleration, Amazon, Microsoft, and many other major cloud service providers have included field-programmable gate arrays (FPGAs) in their datacenters. However, researchers have shown that cloud FPGAs, when shared between multiple tenants, face the threat of remote power side-channel analysis (SCA) attacks. FPGA time-to-digital converter (TDC) sensors enable adversaries to sense voltage fluctuations and, in turn, break cryptographic implementations or extract confidential information with the help of machine learning (ML). The operating temperature of the TDC sensor affects the traces it acquires, but its impact on the success of remote power SCA attacks has largely been ignored in literature. This paper attempts to fill in this gap. We focus on two attack scenarios: correlation power analysis (CPA) and ML-based profiling attacks. We show that the temperature impacts the success of the remote power SCA attacks: with the ambient temperature increasing, the success rate of the CPA attack decreases. In-depth analysis reveals that TDC sensor measurements suffer from temperature-dependent effects, which, if ignored, can lead to misleading and overly optimistic results of ML-based profiling attacks. We evaluate and stress the importance of following power side-channel trace acquisition guidelines for minimizing the temperature effects and, consequently, obtaining a more realistic measure of success for remote ML-based profiling attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Remote Power Side-Channel Attacks on BNN Accelerators in FPGAs
    Moini, Shayan
    Tian, Shanquan
    Holcomb, Daniel
    Szefer, Jakub
    Tessier, Russell
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1639 - 1644
  • [2] Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs
    Moini, Shayan
    Tian, Shanquan
    Holcomb, Daniel
    Szefer, Jakub
    Tessier, Russell
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 357 - 370
  • [3] Shared FPGAs and the Holy Grail: Protections against Side-Channel and Fault Attacks
    Glamocanin, Ognjen
    Mahmoud, Dina G.
    Regazzoni, Francesco
    Stojilovic, Mirjana
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1645 - 1650
  • [4] FPGA-Based Remote Power Side-Channel Attacks
    Zhao, Mark
    Suh, G. Edward
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 229 - 244
  • [5] Side-Channel Attacks on Shared Search Indexes
    Wang, Liang
    Grubbs, Paul
    Lu, Jiahui
    Bindschaedler, Vincent
    Cash, David
    Ristenpart, Thomas
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 673 - 692
  • [6] Remote Side-Channel Attacks on Anonymous Transactions
    Tramer, Florian
    Boneh, Dan
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756
  • [7] Remote Side-Channel Attacks on Heterogeneous SoC
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    Olivier, Francis
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 109 - 125
  • [8] Physical Side-Channel Attacks and Covert Communication on FPGAs: A Survey
    Mirzargar, Seyedeh Sharareh
    Stojilovic, Mirjana
    2019 29TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2019, : 202 - 210
  • [9] Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
    Wang, Yingchen
    Paccagnella, Riccardo
    He, Elizabeth Tang
    Shacham, Hovav
    Fletcher, Christopher W.
    Kohlbrenner, David
    IEEE MICRO, 2023, 43 (04) : 19 - 27
  • [10] Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
    Wang, Yingchen
    Paccagnella, Riccardo
    He, Elizabeth Tang
    Shacham, Hovav
    Fletcher, Christopher W.
    Kohlbrenner, David
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 679 - 697