Ιδρυματικό Αποθετήριο
Πολυτεχνείο Κρήτης
EN  |  EL

Αναζήτηση

Πλοήγηση

Ο Χώρος μου

Assessing the effectiveness of active fences against SCAs for multi-tenant FPGAs

Diktopoulos Christos, Georgopoulos Konstantinos, Brokalakis Andreas, Christou Georgios, Chrysos Grigorios, Morianos Ioannis, Ioannidis Sotirios

Πλήρης Εγγραφή


URI: http://purl.tuc.gr/dl/dias/FD2F3228-28CF-4E7F-807D-D1268A9E8DC8
Έτος 2022
Τύπος Πλήρης Δημοσίευση σε Συνέδριο
Άδεια Χρήσης
Λεπτομέρειες
Βιβλιογραφική Αναφορά C. Diktopoulos, K. Georgopoulos, A. Brokalakis, G. Christou, G. Chrysos, I. Morianos and S. Ioannidis, "Assessing the effectiveness of active fences against SCAs for multi-tenant FPGAs," in Proceedings of the 32nd International Conference on Field-Programmable Logic and Applications (FPL 2022), Belfast, United Kingdom, 2022, pp. 391-396, doi: 10.1109/FPL57034.2022.00065. https://doi.org/10.1109/FPL57034.2022.00065
Εμφανίζεται στις Συλλογές

Περίληψη

The rising use of FPGAs, in the context of cloud computing, has created security concerns. Previous works have shown that malicious users can implement voltage fluctuation sensors and mount successful power analysis attacks against cryptographic algorithms that share the same Power Distribution Network (PDN). So far, masking and hiding schemes are the two main mitigation strategies against such attacks and previous work has shown that the use of an active fence of Ring Oscillators (ROs) holds the potential for constituting an effective hiding countermeasure if placed between two adversary users. Nevertheless, developing an effective proposition against remote Side-Channel Attacks (SCAs) remains an open research topic. This work presents the mapping of an intra-FPGA adversary scenario on a Xilinx UltraScale+ MPSoC to assess the effectiveness of the Ring Oscillator active fence countermeasure. We compare different active fence configurations, with a varying number of Ring Oscillators, while using a new, resource efficient, activation method aiming at the achievement of noise injection hiding. The results show that by using our active fence scheme, which exhibits lower area overhead and lower power consumption than the algorithm under attack, the side-channel leakage is reduced to such a degree that the amount of traces that need to be collected for a successful attack is more than ten times higher compared to no fence present. Moreover, this work presents qualitative results that FPGA cloud providers can consider in order to assess the benefits gained through the deployment of active fence mechanisms within their platforms for multi-tenant services.

Υπηρεσίες

Στατιστικά