A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks

Field-programmable gate arrays (FPGAs) deployed on commercial cloud services are increasingly gaining popularity due to the cost and compute benefits offered by them. Recent studies have discovered security threats than can be launched remotely on FPGAs that share the logic fabric between trusted a...

Full description

Bibliographic Details
Main Authors: Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2022-08-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9832
_version_ 1797690065740103680
author Brian Udugama
Darshana Jayasinghe
Hassaan Saadat
Aleksandar Ignjatovic
Sri Parameswaran
author_facet Brian Udugama
Darshana Jayasinghe
Hassaan Saadat
Aleksandar Ignjatovic
Sri Parameswaran
author_sort Brian Udugama
collection DOAJ
description Field-programmable gate arrays (FPGAs) deployed on commercial cloud services are increasingly gaining popularity due to the cost and compute benefits offered by them. Recent studies have discovered security threats than can be launched remotely on FPGAs that share the logic fabric between trusted and untrusted parties, posing a danger to designs deployed on cloud FPGAs. With remote power analysis (RPA) attacks, an attacker aims to deduce secret information present on a remote FPGA by deploying an on-chip sensor on the FPGA logic fabric. Information captured with the on-chip sensor is transferred off the chip for analysis and existing on-chip sensors demand a significant amount of bandwidth for this task as a result of their wider output bit width. However, attackers are often left with the only option of using a covert communication channel and the bandwidth of such channels is generally limited. This paper proposes a novel area-efficient on-chip power sensor named PPWM that integrates a logic design outputting a pulse whose width is modulated by the power consumption of the FPGA. This pulse is used to clear a flip-flop selectively and asynchronously, and the single-bit output of the flip-flop is used to perform an RPA attack. This paper demonstrates the possibility of successfully recovering a 128-bit Advanced Encryption Standard (AES) key within 16,000 power traces while consuming just 25% of the bandwidth when compared to the state of the art. Moreover, this paper assesses the threat posed by the proposed PPWM to remote FPGAs including those that are deployed on cloud services.
first_indexed 2024-03-12T01:54:11Z
format Article
id doaj.art-5b7298cc986040c2a2c36945f72865dc
institution Directory Open Access Journal
issn 2569-2925
language English
last_indexed 2024-03-12T01:54:11Z
publishDate 2022-08-01
publisher Ruhr-Universität Bochum
record_format Article
series Transactions on Cryptographic Hardware and Embedded Systems
spelling doaj.art-5b7298cc986040c2a2c36945f72865dc2023-09-08T07:01:08ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252022-08-012022410.46586/tches.v2022.i4.589-613A Power to Pulse Width Modulation Sensor for Remote Power Analysis AttacksBrian Udugama0Darshana Jayasinghe1Hassaan Saadat2Aleksandar Ignjatovic3Sri Parameswaran4School of Computer Science and Engineering, University of New South Wales, Sydney, AustraliaSchool of Computer Science and Engineering, University of New South Wales, Sydney, AustraliaSchool of Computer Science and Engineering, University of New South Wales, Sydney, AustraliaSchool of Computer Science and Engineering, University of New South Wales, Sydney, AustraliaSchool of Computer Science and Engineering, University of New South Wales, Sydney, Australia Field-programmable gate arrays (FPGAs) deployed on commercial cloud services are increasingly gaining popularity due to the cost and compute benefits offered by them. Recent studies have discovered security threats than can be launched remotely on FPGAs that share the logic fabric between trusted and untrusted parties, posing a danger to designs deployed on cloud FPGAs. With remote power analysis (RPA) attacks, an attacker aims to deduce secret information present on a remote FPGA by deploying an on-chip sensor on the FPGA logic fabric. Information captured with the on-chip sensor is transferred off the chip for analysis and existing on-chip sensors demand a significant amount of bandwidth for this task as a result of their wider output bit width. However, attackers are often left with the only option of using a covert communication channel and the bandwidth of such channels is generally limited. This paper proposes a novel area-efficient on-chip power sensor named PPWM that integrates a logic design outputting a pulse whose width is modulated by the power consumption of the FPGA. This pulse is used to clear a flip-flop selectively and asynchronously, and the single-bit output of the flip-flop is used to perform an RPA attack. This paper demonstrates the possibility of successfully recovering a 128-bit Advanced Encryption Standard (AES) key within 16,000 power traces while consuming just 25% of the bandwidth when compared to the state of the art. Moreover, this paper assesses the threat posed by the proposed PPWM to remote FPGAs including those that are deployed on cloud services. https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9832Cloud FPGAMulti-Tenant FPGASide-Channel AttackRemote Power Analysis AttackOn-chip Sensors
spellingShingle Brian Udugama
Darshana Jayasinghe
Hassaan Saadat
Aleksandar Ignjatovic
Sri Parameswaran
A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
Transactions on Cryptographic Hardware and Embedded Systems
Cloud FPGA
Multi-Tenant FPGA
Side-Channel Attack
Remote Power Analysis Attack
On-chip Sensors
title A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
title_full A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
title_fullStr A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
title_full_unstemmed A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
title_short A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
title_sort power to pulse width modulation sensor for remote power analysis attacks
topic Cloud FPGA
Multi-Tenant FPGA
Side-Channel Attack
Remote Power Analysis Attack
On-chip Sensors
url https://ojs-dev.ub.rub.de/index.php/TCHES/article/view/9832
work_keys_str_mv AT brianudugama apowertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT darshanajayasinghe apowertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT hassaansaadat apowertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT aleksandarignjatovic apowertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT sriparameswaran apowertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT brianudugama powertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT darshanajayasinghe powertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT hassaansaadat powertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT aleksandarignjatovic powertopulsewidthmodulationsensorforremotepoweranalysisattacks
AT sriparameswaran powertopulsewidthmodulationsensorforremotepoweranalysisattacks