2021
DOI: 10.46586/tches.v2021.i3.441-464
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-Service on FPGA-based Cloud Infrastructures — Attack and Defense

Abstract: This paper presents attacks targeting the FPGAs of AWS F1 instances at the electrical level through power-hammering, where excessive dynamic power is used to crash FPGA instances. We demonstrate different power-hammering attacks that pass all AWS security fences implemented on F1 instances, including the FPGA vendor design rule checks. In addition, we fingerprint the FPGA instances to observe the responsiveness of the instances, which indicates a successful denial-of-service attack. Most importantly, we provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 19 publications
0
0
0
Order By: Relevance
“…If the increase is significant enough, timing constraints may be violated, resulting in a faulty operation [34]. Various implementations of FPGA power wasters have been presented in literature [35]. Given that dynamic power consumption increases with the switching frequency, fast oscillators such as combinational ring oscillators (ROs) emerged as some of the most effective power wasters [36].…”
Section: Remote Undervolting-based Fault Injectionmentioning
confidence: 99%
“…If the increase is significant enough, timing constraints may be violated, resulting in a faulty operation [34]. Various implementations of FPGA power wasters have been presented in literature [35]. Given that dynamic power consumption increases with the switching frequency, fast oscillators such as combinational ring oscillators (ROs) emerged as some of the most effective power wasters [36].…”
Section: Remote Undervolting-based Fault Injectionmentioning
confidence: 99%
“…Due to the use of general-purpose segments for routing in ROs making them to different frequencies, RO-voltage sensors are less sensitive to voltage fluctuations, thus multiple instances of RO-voltage sensors were needed [GDTL19]. ROs can be detected due to their combinational loop (Amazon EC2 F1 cloud service use this feature to prohibit implementing ROs in their FPGAs) [LPPK21]. Therefore, RO-voltage sensors can be detected in FPGAs.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, some cloud service providers, such as Amazon AWS, do not allow combinational loops in FPGA designs. As an alternative, researchers investigated power wasters free of combinational loops [26]- [28], typically less effective than ROs. In the active fence scenario, power wasters generate noise to reduce the signal-to-noise ratio (SNR); the noise must not be excessive, as the victim needs to operate correctly in its presence.…”
Section: B Power Wastersmentioning
confidence: 99%
“…When the enable signal is active, the RO oscillates at a high frequency and draws current. An enhanced version of a NAND-based RO, ERO, was later proposed by La et al and used to perform a remote DoS attack [28]. In the case of EROs, the output of one RO is connected to an unused LUT input of another nearby RO, thereby enhancing the effects of the switching activity thanks to the capacitance of the local interconnect.…”
Section: B Power Wastersmentioning
confidence: 99%