Conference item icon

Conference item

CAPSULe: Cross-FPGA covert-channel attacks through power supply unit leakage

Abstract:
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits that can be used as hardware accelerators to process highly-sensitive data. Leaking this data and associated cryptographic keys, however, can undermine a system’s security. To prevent potentially unintentional interactions that could break separation of privilege between different data center tenants, FPGAs in cloud environments are currently dedicated on a per-user basis. Nevertheless, while the FPGAs themselves are not shared among different users, other parts of the data center infrastructure are. This paper specifically shows for the first time that powering FPGAs, CPUs, and GPUs through the same power supply unit (PSU) can be exploited in FPGA-to-FPGA, CPU-to-FPGA, and GPU-to-FPGA covert channels between independent boards. These covert channels can operate remotely, without the need for physical access to, or modifications of, the boards. To demonstrate the attacks, this paper uses a novel combination of “sensing” and “stressing” ring oscillators as receivers on the sink FPGA. Further, ring oscillators are used as transmitters on the source FPGA. The transmitting and receiving circuits are used to determine the presence of the leakage on off-the-shelf Xilinx boards containing Artix 7 and Kintex 7 FPGA chips. Experiments are conducted with PSUs by two vendors, as well as CPUs and GPUs of different generations. Moreover, different sizes and types of ring oscillators are also tested. In addition, this work discusses potential countermeasures to mitigate the impact of the cross-board leakage. The results of this paper highlight the dangers of shared power supply units in local and cloud FPGAs, and therefore a fundamental need to re-think FPGA security for shared infrastructures
Publication status:
Published
Peer review status:
Reviewed (other)

Actions


Access Document


Files:
Publisher copy:
10.1109/SP40000.2020.00070

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Sub department:
Computer Science
Role:
Author
ORCID:
0000-0002-3700-2742
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Sub department:
Computer Science
Role:
Author
ORCID:
0000-0002-9471-9985


Publisher:
IEEE
Journal:
IEEE Symposium on Security and Privacy More from this journal
Volume:
1
Issue:
2020
Pages:
909-922
Publication date:
2020-04-01
Acceptance date:
2019-11-09
Event title:
IEEE Symposium on Security and Privacy (SP)
Event location:
San Francisco, CA
Event website:
http://www.ieee-security.org/
Event start date:
2020-05-17
Event end date:
2020-05-21
DOI:
ISSN:
1081-6011
ISBN:
978-1-7281-3497-0


Language:
English
Keywords:
Pubs id:
1100102
Local pid:
pubs:1100102
Deposit date:
2020-04-14

Terms of use



Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP