2018 IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM) 2018
DOI: 10.1109/fccm.2018.00016
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Side Channel Attacks without Physical Access

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 102 publications
(52 citation statements)
references
References 5 publications
0
48
0
Order By: Relevance
“…Schellenberg et al [2] and Zhao et al [3], followed by demonstrating a multi-tenant power sidechannel attack. Ramesh et al [4] and Giechaskiel et al [5] demonstrated a side-channel attack leveraging the crosstalk effects between the neighboring long wires of the FPGA. Our work differs from these in that we use the voltage-drop attack with the aim to cause timing constraints violations.…”
Section: Related Workmentioning
confidence: 99%
“…Schellenberg et al [2] and Zhao et al [3], followed by demonstrating a multi-tenant power sidechannel attack. Ramesh et al [4] and Giechaskiel et al [5] demonstrated a side-channel attack leveraging the crosstalk effects between the neighboring long wires of the FPGA. Our work differs from these in that we use the voltage-drop attack with the aim to cause timing constraints violations.…”
Section: Related Workmentioning
confidence: 99%
“…A power analysis attack on an Amazon EC2 F1 instance [1] was successfully carried out by Glamočanin et al [7]. Furthermore, Ramesh et al [10] and Giechaskiel et al [8] demonstrated a crosstalkcoupling side-channel attack between the neighboring long wires of an FPGA. Mahmoud et al used ring oscillators (ROs) to bias the output of a colocated true random number generator [6].…”
Section: A Attacks In Multi-tenant Fpgasmentioning
confidence: 99%
“…At the same time, partial reconfiguration enables temporal and spatial multiplexing of the FPGA die, rendering a multi-tenant use mode compatible with the rest of the cloud ecosystem. These appealing computing features, however, have raised new security concerns supported by recent denialof-service, fault-injection, power side-channel and crosstalk side-channel attacks, as well as covert communication on shared FPGAs [3]- [10].…”
Section: Introductionmentioning
confidence: 99%
“…Successful examples of these attacks exploited directly the relation between circuit activity and the voltage fluctuations on the power distribution network (PDN) to extract encryption keys of a neighbouring encryption core [3], [4] or exploited the crosstalk coupling to extract values of secret data from neighbouring long wires [6], [7]. These attacks were carried out in a controlled lab environment with a dedicated setup and, while giving the intuition that the threat could also be exploitable in a real cloud environment, they were not providing any clear evidence of this fact.…”
Section: Introductionmentioning
confidence: 99%