Power-hammering through Glitch Amplification - Attacks and Mitigation

被引:19
|
作者
Matas, Kaspar [1 ]
Tuan Minh La [1 ]
Khoa Dang Pham [1 ]
Koch, Dirk [1 ]
机构
[1] Univ Manchester, Manchester, Lancs, England
关键词
D O I
10.1109/FCCM48280.2020.00018
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent work on FPGA hardware security showed a substantial potential risk through power-hammering, which uses high switching activity in order to create excessive dynamic power loads. Virtually all present power-hammering attack scenarios are based on some kind of ring oscillators for which mitigation strategies exist. In this paper, we use a different strategy to create excessive dynamic power consumption: glitch amplification. By carefully designing XOR trees, fast switching wires can be implemented that, while driving high fan-out nets, can draw enough power to crash an FPGA. In addition to the attack (which is crashing an Ultra96 board), we will present a scanner for detecting malicious glitch amplifying FPGA designs.
引用
收藏
页码:65 / 69
页数:5
相关论文
共 50 条
  • [1] Automating Mitigation of Amplification Attacks in NFV Services
    Repetto, Matteo
    Bruno, Gianmarco
    Yusupov, Jalolliddin
    Lamanna, Guerino
    Ertl, Benjamin
    Carrega, Alessandro
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2382 - 2396
  • [2] Power supply glitch attacks: design and evaluation of detection circuits
    Gomina, Kamil
    Rigaud, Jean-Baptiste
    Gendrier, Philippe
    Candelier, Philippe
    Tria, Assia
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 136 - 141
  • [3] Characterizing Optimal DNS Amplification Attacks and Effective Mitigation
    MacFarland, Douglas C.
    Shue, Craig A.
    Kalafut, Andrew J.
    [J]. PASSIVE AND ACTIVE MEASUREMENT (PAM 2015), 2015, 8995 : 15 - 27
  • [4] Mitigation of DoS attacks through QoS regulation
    Garg, A
    Reddy, ALN
    [J]. 2002 TENTH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2002, : 45 - 53
  • [5] Mitigation of DOS attacks through QoS regulation
    Garg, A
    Reddy, ALN
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2004, 28 (10) : 521 - 530
  • [6] A review of amplification-based distributed denial of service attacks and their mitigation
    Ismail, Salih
    Hassen, Hani Ragab
    Just, Mike
    Zantout, Hind
    [J]. COMPUTERS & SECURITY, 2021, 109
  • [7] DNS Amplification Based DDoS Attacks in SDN Environment: Detection and Mitigation
    Gupta, Vishal
    Kochar, Amrit
    Saharan, Shail
    Kulshrestha, Rakhee
    [J]. 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 473 - 478
  • [8] A review of amplification-based distributed denial of service attacks and their mitigation
    Ismail, Salih
    Hassen, Hani Ragab
    Just, Mike
    Zantout, Hind
    [J]. Computers and Security, 2021, 109
  • [9] DNS Amplification & DNS Tunneling Attacks Simulation, Detection and Mitigation Approaches
    Sanjay
    Rajendran, Balaji
    Shetty, Pushparaj D.
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 230 - 236
  • [10] Mitigation of DDoS Attacks through Pushback and Resource Regulation
    Wang, Xiuli
    [J]. 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 225 - 228