FPGAD efender
Autor: | Khoa Dang Pham, Kaspar Matas, Dirk Koch, Nikola Grunchevski, Tuan Minh La |
---|---|
Rok vydání: | 2020 |
Předmět: |
Hardware security module
General Computer Science Computer science 0211 other engineering and technologies Cloud computing Denial-of-service attack 02 engineering and technology bitstream Power budget mitigation Hardware_INTEGRATEDCIRCUITS 0202 electrical engineering electronic engineering information engineering Side channel attack Bitstream Field-programmable gate array FPGA 021106 design practice & management business.industry power-hammering denial-of-service side-channel 020202 computer hardware & architecture Embedded system hardware security business countermeasure Countermeasure (computer) Hardware_LOGICDESIGN |
Zdroj: | La, T, Mätas, K, Grunchevski, N, Pham, K & Koch, D 2020, ' FPGADefender: Malicious Self-Oscillator Scanning for Xilinx UltraScale+ FPGAs ', ACM Transactions on Reconfigurable Technology and Systems, vol. 13, no. 3, 3402937 . https://doi.org/10.1145/3402937 |
ISSN: | 1936-7414 1936-7406 |
DOI: | 10.1145/3402937 |
Popis: | Sharing configuration bitstreams rather than netlists is a very desirable feature to protect IP or to share IP without longer CAD tool processing times. Furthermore, an increasing number of systems could hugely benefit from serving multiple users on the same FPGA, for example, for resource pooling in cloud infrastructures. This article researches the threat that a malicious application can impose on an FPGA-based system in a multi-tenancy scenario from a hardware security point of view. In particular, this article evaluates the risk systematically for FPGA power-hammering through short-circuits and self-oscillating circuits, which potentially may cause harm to a system. This risk includes implementing, tuning, and evaluating all FPGA self-oscillators known from the literature but also developing a large number of new power-hammering designs that have not been considered before. Our experiments demonstrate that malicious circuits can be tuned to the point that just 3% of the logic available on an Ultra96 FPGA board can draw the power budget of the entire FPGA board. This fact suggests a waste power potential for datacenter FPGAs in the range of kilowatts. In addition to carefully analyzing FPGA hardware security threats, we present the FPGA virus scanner FPGAD efender , which can detect (possibly) any self-oscillating FPGA circuit, as well as detecting short-circuits, high fanout nets, and a tapping onto signals outside the scope of a module for protecting data center FPGAs, such as Xilinx UltraScale+ devices at the bitstream level. |
Databáze: | OpenAIRE |
Externí odkaz: |