Voltage drop-based fault attacks on FPGAs using valid bitstreams

Due to the widespread use of FPGAs in many critical application domains, their security is of high concern. In recent systems, such as FPGAs in the Cloud or in Systems-on-Chip (SoCs), users can gain access, even remotely, to the reconfigurable fabric to implement custom accelerators. This access can...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:International Conference on Field-programmable Logic and Applications s. 1 - 7
Hlavní autoři: Gnad, Dennis R. E., Oboril, Fabian, Tahoori, Mehdi B.
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: Ghent University 01.09.2017
Témata:
ISSN:1946-1488
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Due to the widespread use of FPGAs in many critical application domains, their security is of high concern. In recent systems, such as FPGAs in the Cloud or in Systems-on-Chip (SoCs), users can gain access, even remotely, to the reconfigurable fabric to implement custom accelerators. This access can expose new security vulnerabilities in the entire system through malicious use of the FPGA fabric. In the past, attacks on the power supply level required local access to the hardware. In this paper, we reveal a security vulnerability in FPGAs that allows a valid configuration to generate severe voltage fluctuations, which crashes the FPGA within a few microseconds. Moreover, the extent of this crash is so severe, that manual power-cycling is required to be able to access and use the system again. This vulnerability has been systematically exploited in two different generations of FPGAs, and a SoC containing an FPGA. Because this vulnerability can lead to severe security attacks in systems using FPGA-based accelerators, we also analyze its underlying mechanism, and discuss possibilities for mitigation.
AbstractList Due to the widespread use of FPGAs in many critical application domains, their security is of high concern. In recent systems, such as FPGAs in the Cloud or in Systems-on-Chip (SoCs), users can gain access, even remotely, to the reconfigurable fabric to implement custom accelerators. This access can expose new security vulnerabilities in the entire system through malicious use of the FPGA fabric. In the past, attacks on the power supply level required local access to the hardware. In this paper, we reveal a security vulnerability in FPGAs that allows a valid configuration to generate severe voltage fluctuations, which crashes the FPGA within a few microseconds. Moreover, the extent of this crash is so severe, that manual power-cycling is required to be able to access and use the system again. This vulnerability has been systematically exploited in two different generations of FPGAs, and a SoC containing an FPGA. Because this vulnerability can lead to severe security attacks in systems using FPGA-based accelerators, we also analyze its underlying mechanism, and discuss possibilities for mitigation.
Author Oboril, Fabian
Tahoori, Mehdi B.
Gnad, Dennis R. E.
Author_xml – sequence: 1
  givenname: Dennis R. E.
  surname: Gnad
  fullname: Gnad, Dennis R. E.
  email: Dennis.R.E.Gnad@kit.edu
  organization: Inst. of Comput. Eng., Karlsruhe Inst. of Technol., Karlsruhe, Germany
– sequence: 2
  givenname: Fabian
  surname: Oboril
  fullname: Oboril, Fabian
  email: Fabian.Oboril@kit.edu
  organization: Inst. of Comput. Eng., Karlsruhe Inst. of Technol., Karlsruhe, Germany
– sequence: 3
  givenname: Mehdi B.
  surname: Tahoori
  fullname: Tahoori, Mehdi B.
  email: Mehdi.B.Tahoori@kit.edu
  organization: Inst. of Comput. Eng., Karlsruhe Inst. of Technol., Karlsruhe, Germany
BookMark eNotj91KwzAYQKMouM09gHiTF2j98tcmd45hp1BwF-rt-NIkI9q1o8kE317BnZtzd-DMydUwDp6QOwYlF4aZh2bblhxYXWpQlZZwQeYGDAiQXPNLMmNGVgWTWt-QZUqf8IeStVbVjDx-jH3GvaduGo-FxeQdDXjqM8WcsftKdBxos92sEj2lOOzpN_bRURtzypPHQ7ol1wH75JdnL8h78_S2fi7a183LetUWkdUqF7bGTgUXOGeVEaJGDqZDKZ1WLgQVrGbYWdSM69o7CFrwIEEEkF2FhlmxIPf_3ei93x2neMDpZ3ceFr-K7EtK
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.23919/FPL.2017.8056840
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9090304282
9789090304281
EISSN 1946-1488
EndPage 7
ExternalDocumentID 8056840
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-b7ac5fdf22169337a209ca44d85dff5fb81acba81287ed0f832f403f04c6a91b3
IEDL.DBID RIE
ISICitedReferencesCount 100
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000426989400084&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:28:39 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-b7ac5fdf22169337a209ca44d85dff5fb81acba81287ed0f832f403f04c6a91b3
PageCount 7
ParticipantIDs ieee_primary_8056840
PublicationCentury 2000
PublicationDate 2017-Sept.
PublicationDateYYYYMMDD 2017-09-01
PublicationDate_xml – month: 09
  year: 2017
  text: 2017-Sept.
PublicationDecade 2010
PublicationTitle International Conference on Field-programmable Logic and Applications
PublicationTitleAbbrev FPL
PublicationYear 2017
Publisher Ghent University
Publisher_xml – name: Ghent University
SSID ssj0000547856
Score 2.0025585
Snippet Due to the widespread use of FPGAs in many critical application domains, their security is of high concern. In recent systems, such as FPGAs in the Cloud or in...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Clocks
Computer crashes
Delays
Fabrics
Field programmable gate arrays
Latches
Security
Title Voltage drop-based fault attacks on FPGAs using valid bitstreams
URI https://ieeexplore.ieee.org/document/8056840
WOSCitedRecordID wos000426989400084&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFH5sw4MnlU38TQ4ezdY2SdPeFLF6GKMHld1GfkphtmPL_PtN2jERvHgLgRDeS14-knzfewC3PI5TIa3EJtDVKDMWC0oFtowapVUoA9dWLZny2Sybz_OyB3d7LYwxpiWfmXFotn_5ulHb8FQ2yTxa-wtJH_qc806rtX9PiUJiKpZ2H5cJyeN8UpTTwN3i4924XwVUWvwojv438zGMfoR4qNxDzAn0TD2E-_dm6fwxgPS6WeEAQxpZsV06JJwLknnU1Kgonx82KLDaP5DfTJVGsnJBGCI-NyN4K55eH1_wrhACrjy6Oyy5UMxqmyQhdQrhIoly5V2qM6atZVZmsVBSeKzOuNGR9VFqaURsRFUq8liSUxjUTW3OACWcaRZJaiWNqfDBZwhJZaQTkopMUnIOw2D9YtXluljsDL_4u_sSDoODO87VFQzcemuu4UB9uWqzvmkX6BtiGJH6
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5qFfSk0opvc_Do1t1Nso-bIq4V17KHKr2VPGWh7pY29feb7JaK4MVbCIQwk0w-knzfDMB1HAQR45p7ytHVCFXaY4QwT1OihBSuDFxTtSSPR6NkMkmLDtxstDBKqYZ8pgau2fzly1qs3FPZbWLR2l5ItmCbEhIGrVpr86Liu9RUNGq_LkOcBultVuSOvRUP1iN_lVBpECTb_9_cB9D_keKhYgMyh9BRVQ_u3uuZsQcBkot67jkgkkiz1cwgZowTzaO6QlnxdL9Ejtf-gex2KiXipXHSEPa57MNb9jh-GHrrUgheafHdeDxmgmqpw9AlT8ExC_1UWKfKhEqtqeZJwARnFq2TWElf2zjVxMfaJyJiacDxEXSrulLHgMKYSupzojkJCLPhpzCOuC9DHLGEE3wCPWf9dN5mu5iuDT_9u_sKdofj13yaP49ezmDPObtlYJ1D1yxW6gJ2xJcpl4vLZrG-ASxVlUE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=International+Conference+on+Field-programmable+Logic+and+Applications&rft.atitle=Voltage+drop-based+fault+attacks+on+FPGAs+using+valid+bitstreams&rft.au=Gnad%2C+Dennis+R.+E.&rft.au=Oboril%2C+Fabian&rft.au=Tahoori%2C+Mehdi+B.&rft.date=2017-09-01&rft.pub=Ghent+University&rft.eissn=1946-1488&rft.spage=1&rft.epage=7&rft_id=info:doi/10.23919%2FFPL.2017.8056840&rft.externalDocID=8056840