Voltage drop-based fault attacks on FPGAs using valid bitstreams
Due to the widespread use of FPGAs in many critical application domains, their security is of high concern. In recent systems, such as FPGAs in the Cloud or in Systems-on-Chip (SoCs), users can gain access, even remotely, to the reconfigurable fabric to implement custom accelerators. This access can...
Uloženo v:
| Vydáno v: | International Conference on Field-programmable Logic and Applications s. 1 - 7 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
Ghent University
01.09.2017
|
| Témata: | |
| ISSN: | 1946-1488 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Due to the widespread use of FPGAs in many critical application domains, their security is of high concern. In recent systems, such as FPGAs in the Cloud or in Systems-on-Chip (SoCs), users can gain access, even remotely, to the reconfigurable fabric to implement custom accelerators. This access can expose new security vulnerabilities in the entire system through malicious use of the FPGA fabric. In the past, attacks on the power supply level required local access to the hardware. In this paper, we reveal a security vulnerability in FPGAs that allows a valid configuration to generate severe voltage fluctuations, which crashes the FPGA within a few microseconds. Moreover, the extent of this crash is so severe, that manual power-cycling is required to be able to access and use the system again. This vulnerability has been systematically exploited in two different generations of FPGAs, and a SoC containing an FPGA. Because this vulnerability can lead to severe security attacks in systems using FPGA-based accelerators, we also analyze its underlying mechanism, and discuss possibilities for mitigation. |
|---|---|
| AbstractList | Due to the widespread use of FPGAs in many critical application domains, their security is of high concern. In recent systems, such as FPGAs in the Cloud or in Systems-on-Chip (SoCs), users can gain access, even remotely, to the reconfigurable fabric to implement custom accelerators. This access can expose new security vulnerabilities in the entire system through malicious use of the FPGA fabric. In the past, attacks on the power supply level required local access to the hardware. In this paper, we reveal a security vulnerability in FPGAs that allows a valid configuration to generate severe voltage fluctuations, which crashes the FPGA within a few microseconds. Moreover, the extent of this crash is so severe, that manual power-cycling is required to be able to access and use the system again. This vulnerability has been systematically exploited in two different generations of FPGAs, and a SoC containing an FPGA. Because this vulnerability can lead to severe security attacks in systems using FPGA-based accelerators, we also analyze its underlying mechanism, and discuss possibilities for mitigation. |
| Author | Oboril, Fabian Tahoori, Mehdi B. Gnad, Dennis R. E. |
| Author_xml | – sequence: 1 givenname: Dennis R. E. surname: Gnad fullname: Gnad, Dennis R. E. email: Dennis.R.E.Gnad@kit.edu organization: Inst. of Comput. Eng., Karlsruhe Inst. of Technol., Karlsruhe, Germany – sequence: 2 givenname: Fabian surname: Oboril fullname: Oboril, Fabian email: Fabian.Oboril@kit.edu organization: Inst. of Comput. Eng., Karlsruhe Inst. of Technol., Karlsruhe, Germany – sequence: 3 givenname: Mehdi B. surname: Tahoori fullname: Tahoori, Mehdi B. email: Mehdi.B.Tahoori@kit.edu organization: Inst. of Comput. Eng., Karlsruhe Inst. of Technol., Karlsruhe, Germany |
| BookMark | eNotj91KwzAYQKMouM09gHiTF2j98tcmd45hp1BwF-rt-NIkI9q1o8kE317BnZtzd-DMydUwDp6QOwYlF4aZh2bblhxYXWpQlZZwQeYGDAiQXPNLMmNGVgWTWt-QZUqf8IeStVbVjDx-jH3GvaduGo-FxeQdDXjqM8WcsftKdBxos92sEj2lOOzpN_bRURtzypPHQ7ol1wH75JdnL8h78_S2fi7a183LetUWkdUqF7bGTgUXOGeVEaJGDqZDKZ1WLgQVrGbYWdSM69o7CFrwIEEEkF2FhlmxIPf_3ei93x2neMDpZ3ceFr-K7EtK |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.23919/FPL.2017.8056840 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9090304282 9789090304281 |
| EISSN | 1946-1488 |
| EndPage | 7 |
| ExternalDocumentID | 8056840 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
| ID | FETCH-LOGICAL-i175t-b7ac5fdf22169337a209ca44d85dff5fb81acba81287ed0f832f403f04c6a91b3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 100 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000426989400084&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:28:39 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-b7ac5fdf22169337a209ca44d85dff5fb81acba81287ed0f832f403f04c6a91b3 |
| PageCount | 7 |
| ParticipantIDs | ieee_primary_8056840 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-Sept. |
| PublicationDateYYYYMMDD | 2017-09-01 |
| PublicationDate_xml | – month: 09 year: 2017 text: 2017-Sept. |
| PublicationDecade | 2010 |
| PublicationTitle | International Conference on Field-programmable Logic and Applications |
| PublicationTitleAbbrev | FPL |
| PublicationYear | 2017 |
| Publisher | Ghent University |
| Publisher_xml | – name: Ghent University |
| SSID | ssj0000547856 |
| Score | 2.0025585 |
| Snippet | Due to the widespread use of FPGAs in many critical application domains, their security is of high concern. In recent systems, such as FPGAs in the Cloud or in... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Clocks Computer crashes Delays Fabrics Field programmable gate arrays Latches Security |
| Title | Voltage drop-based fault attacks on FPGAs using valid bitstreams |
| URI | https://ieeexplore.ieee.org/document/8056840 |
| WOSCitedRecordID | wos000426989400084&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH5sw4MnlU38TQ4ezdY2SdPeFLF6GKMHld1GfkphtmPL_PtN2jERvHgLgRDeS14-knzfewC3PI5TIa3EJtDVKDMWC0oFtowapVUoA9dWLZny2Sybz_OyB3d7LYwxpiWfmXFotn_5ulHb8FQ2yTxa-wtJH_qc806rtX9PiUJiKpZ2H5cJyeN8UpTTwN3i4924XwVUWvwojv438zGMfoR4qNxDzAn0TD2E-_dm6fwxgPS6WeEAQxpZsV06JJwLknnU1Kgonx82KLDaP5DfTJVGsnJBGCI-NyN4K55eH1_wrhACrjy6Oyy5UMxqmyQhdQrhIoly5V2qM6atZVZmsVBSeKzOuNGR9VFqaURsRFUq8liSUxjUTW3OACWcaRZJaiWNqfDBZwhJZaQTkopMUnIOw2D9YtXluljsDL_4u_sSDoODO87VFQzcemuu4UB9uWqzvmkX6BtiGJH6 |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5qFfSk0opvc_Do1t1Nso-bIq4V17KHKr2VPGWh7pY29feb7JaK4MVbCIQwk0w-knzfDMB1HAQR45p7ytHVCFXaY4QwT1OihBSuDFxTtSSPR6NkMkmLDtxstDBKqYZ8pgau2fzly1qs3FPZbWLR2l5ItmCbEhIGrVpr86Liu9RUNGq_LkOcBultVuSOvRUP1iN_lVBpECTb_9_cB9D_keKhYgMyh9BRVQ_u3uuZsQcBkot67jkgkkiz1cwgZowTzaO6QlnxdL9Ejtf-gex2KiXipXHSEPa57MNb9jh-GHrrUgheafHdeDxmgmqpw9AlT8ExC_1UWKfKhEqtqeZJwARnFq2TWElf2zjVxMfaJyJiacDxEXSrulLHgMKYSupzojkJCLPhpzCOuC9DHLGEE3wCPWf9dN5mu5iuDT_9u_sKdofj13yaP49ezmDPObtlYJ1D1yxW6gJ2xJcpl4vLZrG-ASxVlUE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=International+Conference+on+Field-programmable+Logic+and+Applications&rft.atitle=Voltage+drop-based+fault+attacks+on+FPGAs+using+valid+bitstreams&rft.au=Gnad%2C+Dennis+R.+E.&rft.au=Oboril%2C+Fabian&rft.au=Tahoori%2C+Mehdi+B.&rft.date=2017-09-01&rft.pub=Ghent+University&rft.eissn=1946-1488&rft.spage=1&rft.epage=7&rft_id=info:doi/10.23919%2FFPL.2017.8056840&rft.externalDocID=8056840 |