2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00070
|View full text |Cite
|
Sign up to set email alerts
|

C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage

Abstract: Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits that can be used as hardware accelerators to process highly-sensitive data. Leaking this data and associated cryptographic keys, however, can undermine a system's security. To prevent potentially unintentional interactions that could break separation of privilege between different data center tenants, FPGAs in cloud environments are currently dedicated on a per-user basis. Nevertheless, while the FPGAs themselves are not s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(14 citation statements)
references
References 38 publications
(54 reference statements)
0
14
0
Order By: Relevance
“…Cloud systems share FPGAs across processors and accelerators, and can be exploited for remote power measurement. 4 In multicore systems, the hierarchical power management policies can be abused to act as power covert channels between cores.…”
Section: Physical Side Channelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Cloud systems share FPGAs across processors and accelerators, and can be exploited for remote power measurement. 4 In multicore systems, the hierarchical power management policies can be abused to act as power covert channels between cores.…”
Section: Physical Side Channelsmentioning
confidence: 99%
“…These attacks can steal information like the identity of the running applications, keystrokes typed, and browser data accessed. This threat model covers the majority of attacks described earlier (e.g., the work of Lifshits et al, 1 Shao et al, 3 Giechaskiel et al, 4 and Masti et al 6 ), except for those attacks identifying encryption keys. 7 The latter attacks are harder to mount, and typically need more detailed knowledge of the cryptosystem being attacked.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In a typical RPA attack, the attacker has to rely on covert communication channels for communicating with the on-chip sensor. Covert communication channels in general can only support lower bandwidths [GRS20] and therefore, it is crucial for the attacker to devise an on-chip sensor that demands minimum communication bandwidth.…”
Section: Introductionmentioning
confidence: 99%
“…A covert communication can also be established via the power management units, which control voltage level and operating frequency. A covert channel attack among FPGAs, CPUs, and GPUs that are connected to the same power supply unit is proposed in [10]. By modulating the core frequency with dynamic frequency scaling (DFS) technique, a covert channel has been created in a multi-core platform [11].…”
Section: Introductionmentioning
confidence: 99%