Securing Cloud FPGAs Against Power Side-Channel Attacks: A Case Study on Iterative AES

The various benefits of multi-tenanting, such as higher device utilization and increased profit margin, intrigue the cloud field-programmable gate array (FPGA) servers to include multi-tenanting in their infrastructure. However, this property makes these servers vulnerable to power side-channel (PSC) attacks. Logic designs such as ring oscillator (RO) and time-to-digital converter (TDC) are used to measure the power consumed by security critical circuits, such as advanced encryption standard (AES). Firstly, the existing works require higher minimum traces for disclosure (MTD). Hence, in this work, we improve the sensitivity of the TDC-based sensors by manually placing the FPGA primitives inferring these sensors. This enhancement helps to determine the 128-bit AES key using 3.8K traces. Secondly, the existing defenses use ROs to defend against PSC attacks. However, cloud servers such as Amazon Web Services (AWS) block design with combinatorial loops. Hence, we propose a placement-based defense. We study the impact of (i) primitive-level placement on the AES design and (ii) additional logic that resides along with the AES on the correlation power analysis (CPA) attack results. Our results showcase that the AES along with filters and/or processors are sufficient to provide the same level or better security than the existing defenses.

READ FULL TEXT

page 5

page 6

page 7

page 9

page 12

research
04/10/2019

The resistance of an FPGA implementation of Grasshopper block cipher to CPA attacks

In this paper, we implement the Russian standard block cipher Grasshoppe...
research
03/11/2023

SHIELD: An Adaptive and Lightweight Defense against the Remote Power Side-Channel Attacks on Multi-tenant FPGAs

Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPG...
research
09/29/2020

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud

In their continuous growth and penetration into new markets, Field Progr...
research
01/11/2019

Don't Wait to be Breached! Creating Asymmetric Uncertainty of Cloud Applications via Moving Target Defenses

Cloud applications expose - besides service endpoints - also potential o...
research
11/15/2022

X-Volt: Joint Tuning of Driver Strengths and Supply Voltages Against Power Side-Channel Attacks

Power side-channel (PSC) attacks are well-known threats to sensitive har...
research
05/12/2019

Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

Position sensors, such as the gyroscope, the magnetometer and the accele...
research
03/31/2019

Spin-Orbit Torque Devices for Hardware Security: From Deterministic to Probabilistic Regime

Protecting intellectual property (IP) has become a serious challenge for...

Please sign up or login with your details

Forgot password? Click here to reset