Temperature Impact on Remote Power Side-Channel Attacks on Shared FPGAs

被引:1
|
作者
Glamocanin, Ognjen [1 ]
Bazaz, Hajira [1 ]
Payer, Mathias [1 ]
Stojilovic, Mirjana [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Lausanne, Switzerland
来源
2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE | 2023年
基金
瑞士国家科学基金会;
关键词
FPGA; multitenancy; machine learning; side-channel attacks; temperature;
D O I
10.23919/DATE56975.2023.10136979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To answer the growing demand for hardware acceleration, Amazon, Microsoft, and many other major cloud service providers have included field-programmable gate arrays (FPGAs) in their datacenters. However, researchers have shown that cloud FPGAs, when shared between multiple tenants, face the threat of remote power side-channel analysis (SCA) attacks. FPGA time-to-digital converter (TDC) sensors enable adversaries to sense voltage fluctuations and, in turn, break cryptographic implementations or extract confidential information with the help of machine learning (ML). The operating temperature of the TDC sensor affects the traces it acquires, but its impact on the success of remote power SCA attacks has largely been ignored in literature. This paper attempts to fill in this gap. We focus on two attack scenarios: correlation power analysis (CPA) and ML-based profiling attacks. We show that the temperature impacts the success of the remote power SCA attacks: with the ambient temperature increasing, the success rate of the CPA attack decreases. In-depth analysis reveals that TDC sensor measurements suffer from temperature-dependent effects, which, if ignored, can lead to misleading and overly optimistic results of ML-based profiling attacks. We evaluate and stress the importance of following power side-channel trace acquisition guidelines for minimizing the temperature effects and, consequently, obtaining a more realistic measure of success for remote ML-based profiling attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [32] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [33] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [34] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [35] Optimal Placement of TDC Sensor for Enhanced Power Side-Channel Assessment on FPGAs
    Das, Debayan
    Sabbagh, Majid
    Elnaggar, Rana
    Chen, Guang
    Ray, Sayak
    Fung, Jason
    PROCEEDINGS OF THE 37TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, VLSID 2024 AND 23RD INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, ES 2024, 2024, : 443 - 448
  • [36] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [37] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [38] Leakage Evaluation on Power Balance Countermeasure Against Side-Channel Attack on FPGAs
    Fang, Xin
    Luo, Pei
    Fei, Yunsi
    Leeser, Miriam
    2015 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2015,
  • [39] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [40] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296