A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
Field-programmable gate arrays (FPGAs) deployed on commercial cloud services are increasingly gaining popularity due to the cost and compute benefits offered by them. Recent studies have discovered security threats than can be launched remotely on FPGAs that share the logic fabric between trusted a...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2022-08-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/9832 |
_version_ | 1797326117356437504 |
---|---|
author | Brian Udugama Darshana Jayasinghe Hassaan Saadat Aleksandar Ignjatovic Sri Parameswaran |
author_facet | Brian Udugama Darshana Jayasinghe Hassaan Saadat Aleksandar Ignjatovic Sri Parameswaran |
author_sort | Brian Udugama |
collection | DOAJ |
description |
Field-programmable gate arrays (FPGAs) deployed on commercial cloud services are increasingly gaining popularity due to the cost and compute benefits offered by them. Recent studies have discovered security threats than can be launched remotely on FPGAs that share the logic fabric between trusted and untrusted parties, posing a danger to designs deployed on cloud FPGAs. With remote power analysis (RPA) attacks, an attacker aims to deduce secret information present on a remote FPGA by deploying an on-chip sensor on the FPGA logic fabric. Information captured with the on-chip sensor is transferred off the chip for analysis and existing on-chip sensors demand a significant amount of bandwidth for this task as a result of their wider output bit width. However, attackers are often left with the only option of using a covert communication channel and the bandwidth of such channels is generally limited. This paper proposes a novel area-efficient on-chip power sensor named PPWM that integrates a logic design outputting a pulse whose width is modulated by the power consumption of the FPGA. This pulse is used to clear a flip-flop selectively and asynchronously, and the single-bit output of the flip-flop is used to perform an RPA attack. This paper demonstrates the possibility of successfully recovering a 128-bit Advanced Encryption Standard (AES) key within 16,000 power traces while consuming just 25% of the bandwidth when compared to the state of the art. Moreover, this paper assesses the threat posed by the proposed PPWM to remote FPGAs including those that are deployed on cloud services.
|
first_indexed | 2024-03-08T06:18:57Z |
format | Article |
id | doaj.art-ed9b1f394dfe483da2955cc0b66e4906 |
institution | Directory Open Access Journal |
issn | 2569-2925 |
language | English |
last_indexed | 2024-03-08T06:18:57Z |
publishDate | 2022-08-01 |
publisher | Ruhr-Universität Bochum |
record_format | Article |
series | Transactions on Cryptographic Hardware and Embedded Systems |
spelling | doaj.art-ed9b1f394dfe483da2955cc0b66e49062024-02-04T16:20:46ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252022-08-0120224A Power to Pulse Width Modulation Sensor for Remote Power Analysis AttacksBrian Udugama0Darshana Jayasinghe1Hassaan Saadat2Aleksandar Ignjatovic3Sri Parameswaran4School of Computer Science and Engineering, University of New South Wales, Sydney, AustraliaSchool of Computer Science and Engineering, University of New South Wales, Sydney, AustraliaSchool of Computer Science and Engineering, University of New South Wales, Sydney, AustraliaSchool of Computer Science and Engineering, University of New South Wales, Sydney, AustraliaSchool of Computer Science and Engineering, University of New South Wales, Sydney, Australia Field-programmable gate arrays (FPGAs) deployed on commercial cloud services are increasingly gaining popularity due to the cost and compute benefits offered by them. Recent studies have discovered security threats than can be launched remotely on FPGAs that share the logic fabric between trusted and untrusted parties, posing a danger to designs deployed on cloud FPGAs. With remote power analysis (RPA) attacks, an attacker aims to deduce secret information present on a remote FPGA by deploying an on-chip sensor on the FPGA logic fabric. Information captured with the on-chip sensor is transferred off the chip for analysis and existing on-chip sensors demand a significant amount of bandwidth for this task as a result of their wider output bit width. However, attackers are often left with the only option of using a covert communication channel and the bandwidth of such channels is generally limited. This paper proposes a novel area-efficient on-chip power sensor named PPWM that integrates a logic design outputting a pulse whose width is modulated by the power consumption of the FPGA. This pulse is used to clear a flip-flop selectively and asynchronously, and the single-bit output of the flip-flop is used to perform an RPA attack. This paper demonstrates the possibility of successfully recovering a 128-bit Advanced Encryption Standard (AES) key within 16,000 power traces while consuming just 25% of the bandwidth when compared to the state of the art. Moreover, this paper assesses the threat posed by the proposed PPWM to remote FPGAs including those that are deployed on cloud services. https://tches.iacr.org/index.php/TCHES/article/view/9832Cloud FPGAMulti-Tenant FPGASide-Channel AttackRemote Power Analysis AttackOn-chip Sensors |
spellingShingle | Brian Udugama Darshana Jayasinghe Hassaan Saadat Aleksandar Ignjatovic Sri Parameswaran A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks Transactions on Cryptographic Hardware and Embedded Systems Cloud FPGA Multi-Tenant FPGA Side-Channel Attack Remote Power Analysis Attack On-chip Sensors |
title | A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks |
title_full | A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks |
title_fullStr | A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks |
title_full_unstemmed | A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks |
title_short | A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks |
title_sort | power to pulse width modulation sensor for remote power analysis attacks |
topic | Cloud FPGA Multi-Tenant FPGA Side-Channel Attack Remote Power Analysis Attack On-chip Sensors |
url | https://tches.iacr.org/index.php/TCHES/article/view/9832 |
work_keys_str_mv | AT brianudugama apowertopulsewidthmodulationsensorforremotepoweranalysisattacks AT darshanajayasinghe apowertopulsewidthmodulationsensorforremotepoweranalysisattacks AT hassaansaadat apowertopulsewidthmodulationsensorforremotepoweranalysisattacks AT aleksandarignjatovic apowertopulsewidthmodulationsensorforremotepoweranalysisattacks AT sriparameswaran apowertopulsewidthmodulationsensorforremotepoweranalysisattacks AT brianudugama powertopulsewidthmodulationsensorforremotepoweranalysisattacks AT darshanajayasinghe powertopulsewidthmodulationsensorforremotepoweranalysisattacks AT hassaansaadat powertopulsewidthmodulationsensorforremotepoweranalysisattacks AT aleksandarignjatovic powertopulsewidthmodulationsensorforremotepoweranalysisattacks AT sriparameswaran powertopulsewidthmodulationsensorforremotepoweranalysisattacks |