Temperature Impact on Remote Power Side-Channel Attacks on Shared FPGAs

被引:1
|
作者
Glamocanin, Ognjen [1 ]
Bazaz, Hajira [1 ]
Payer, Mathias [1 ]
Stojilovic, Mirjana [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Lausanne, Switzerland
基金
瑞士国家科学基金会;
关键词
FPGA; multitenancy; machine learning; side-channel attacks; temperature;
D O I
10.23919/DATE56975.2023.10136979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To answer the growing demand for hardware acceleration, Amazon, Microsoft, and many other major cloud service providers have included field-programmable gate arrays (FPGAs) in their datacenters. However, researchers have shown that cloud FPGAs, when shared between multiple tenants, face the threat of remote power side-channel analysis (SCA) attacks. FPGA time-to-digital converter (TDC) sensors enable adversaries to sense voltage fluctuations and, in turn, break cryptographic implementations or extract confidential information with the help of machine learning (ML). The operating temperature of the TDC sensor affects the traces it acquires, but its impact on the success of remote power SCA attacks has largely been ignored in literature. This paper attempts to fill in this gap. We focus on two attack scenarios: correlation power analysis (CPA) and ML-based profiling attacks. We show that the temperature impacts the success of the remote power SCA attacks: with the ambient temperature increasing, the success rate of the CPA attack decreases. In-depth analysis reveals that TDC sensor measurements suffer from temperature-dependent effects, which, if ignored, can lead to misleading and overly optimistic results of ML-based profiling attacks. We evaluate and stress the importance of following power side-channel trace acquisition guidelines for minimizing the temperature effects and, consequently, obtaining a more realistic measure of success for remote ML-based profiling attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [22] Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
    Schellenberg, Falk
    Gnad, Dennis R. E.
    Moradi, Amir
    Tahoori, Mehdi B.
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [23] Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs
    Ognjen Glamočanin
    Shashwat Shrivastava
    Jinwei Yao
    Nour Ardo
    Mathias Payer
    Mirjana Stojilović
    Journal of Hardware and Systems Security, 2023, 7 (2-3) : 72 - 99
  • [24] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [25] Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks
    Zooker, David
    Elkoni, Matan
    Shalom, Or Ohev
    Weizman, Yoav
    Levi, Itamar
    Keren, Osnat
    Fish, Alexander
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [26] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [27] Power Side-Channel Attacks and Defenses for Neural Network Accelerators
    Meyers, Vincent
    2023 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, FCCM, 2023, : 239 - 241
  • [28] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [29] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [30] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55