Recent works have demonstrated the possibility of extracting secrets from a cryptographic core running on an FPGA by means of remote power analysis attacks. To mount these attacks, an adversary implements a voltage fluctuation sensor in the FPGA logic, records the power consumption of the target cryptographic core, and recovers the secret key by running a power analysis attack on the recorded traces. Despite showing that the power analysis could also be performed without physical access to the cryptographic core, these works were mostly carried out on dedicated FPGA boards in a controlled environment, leaving open the question about the possibility to successfully mount these attacks on a real system deployed in the cloud. In this paper, we demonstrate, for the first time, a successful key recovery attack on an AES cryptographic accelerator running on an Amazon EC2 F1 instance. We collect the power traces using a delay-line based voltage drop sensor, adapted to the Xilinx Virtex Ultrascale+ architecture used on Amazon EC2 F1, where CARRY8 blocks do not have a monotonic delay increase at their outputs. Our results demonstrate that security concerns raised by multitenant FPGAs are indeed valid and that countermeasures should be put in place to mitigate them.
DNN inference accelerators executing online services exhibit low average loads because of service demand variability, leading to poor resource utilization. Unfortunately, reclaiming idle inference cycles is difficult as other workloads can not execute on a custom accelerator. With recent proposals for the use of fixed-point arithmetic in training, there are opportunities for training services to piggyback on inference accelerators. We make the observation that a key challenge in doing so is maintaining service-level latency constraints for inference. We show that relaxing latency constraints in an inference accelerator with ALU arrays that are batching-optimized achieves near-optimal throughput for a given area and power envelope while maintaining inference services' tail latency goals.We present Equinox, a custom inference accelerator designed to piggyback training. Equinox employs a uniform arithmetic encoding to accommodate inference and training and a priority hardware scheduler with adaptive batching that interleaves training during idle inference cycles. For a 500𝜇𝑠 inference service time constraint, Equinox achieves 6.67× higher throughput than a latency-optimal inference accelerator. Despite not being optimized for training services, Equinox achieves up to 78% of the throughput of a dedicated training accelerator that saturates the available compute resources and DRAM bandwidth. Finally, Equinox's controller logic incurs less than 1% power and area overhead, while the uniform encoding (to enable training) incurs 13% power and 4% area overhead compared to a fixed-point inference accelerator. CCS CONCEPTS• Computer systems organization → Systolic arrays; Neural networks; Cloud computing.
Embedded and cyber-physical systems are pervading all aspects of our lives, including sensitive and critical ones. As a result, they are an alluring target for cyber attacks. These systems, whose implementation is often based on reconfigurable hardware, are typically deployed in places accessible to attackers. Therefore, they require protection against tampering and side-channel attacks. However, a side-channel resistant implementation of a security primitive is not sufficient, as it can be weakened by an adversary, aging, or environmental factors. To detect this, legitimate users should be able to evaluate the side-channel resistance of their systems not only when deploying them for the first time, but also during their entire service life. The most widespread and de facto standard methodology for measuring power side-channel leakage uses Welch's t-test. In practice, collecting the data for the t-test requires physical access to the device, a device-specific test setup, and the equipment for measuring the power consumption during device operation. Consequently, only a small number of cyber-physical systems deployed in the field can be tested this way and the tests to reevaluate the device resistance to side-channel attacks cannot be easily repeated. To address these issues, we present a design and an FPGA implementation of a built-in test for self-evaluation of the resistance to first-order power side-channel attacks. Once our test is triggered, the FPGA measures its own internal power-supply voltage and computes the t-test statistic in real time. Experimental results on two different implementations of the AES-128 algorithm demonstrate that the self-evaluation test is very reliable. We believe that this work is an important step towards the development of security sensors for the next generation of safe and robust cyber-physical systems. CCS CONCEPTS • Hardware → Reconfigurable logic and FPGAs; • Security and privacy → Tamper-proof and tamper-resistant designs; Sidechannel analysis and countermeasures.
Par L. GOULON l'organisation du Crabe montre qu'il semble avoir eu pour objet d'occuper le moindre volume possible. Les Brachyures s'adaptent moins iacilement que les Macroures à la vie dans les grandes profondeurs. On les a divisés en cinq tribus. PREMIÈRE TRIBU CRABES QUADRANGULAIRES ou GATOMÉTOPES Carapace plus ou moins quadrangulaire, tronquée transversalement à la partie antérieure, à bords latéraux droits ou légèrement courbes. Les Crabes carrés comprennent cinq familles représentées au Musée. Famille des GÉCARCINIDES Carapace fortement courbée, large en avant, à bords arrondis, à peine dentés. Yeux courts. Ce sont, comme leur nom l'indique, des Crabes terrestres, habituellement désignés sous le nom de Tourlouroux. Les voyageurs ont rapporté des anecdotes curieuses sur les moeurs de ces Crustacés. Ils vivent dans les bois humides et ombragés, dans les bas-fonds marécageux ; plusieurs habitent même les endroits rocailleux. Ils établissent leur nid dans les cloaques. Leurs morsures sont très dangereuses. Ils n'ont d'instincts sociables qu'au moment de la procréation et alors ils se rendent à la mer. On les trouve surtout aux Antilles. Genre GECAUCIiVUS Latr.-GÉGARCIN. De.scriptioii.-II. Lucas : llisloire naturelle des Crustacés, p. 62. Ces Crustacés habitent les pays chauds, les Antilles, les îles Bahamas. Ils jouissent d'une grande réputation auprès des gourmets.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.