Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196518
|View full text |Cite
|
Sign up to set email alerts
|

Leaky Wires

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 60 publications
(18 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…Another remote side-channel attack [43] is demonstrated on the multi-tenant use of FPGAs. In addition, there are attacks [31,52] capable of stealing information from a victim accelerator through the interference between neighbouring two wires used by the victim and attacker. For mounting such attacks on the cloud, its infrastructure has to be known, i.e.…”
Section: Attacker Capabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Another remote side-channel attack [43] is demonstrated on the multi-tenant use of FPGAs. In addition, there are attacks [31,52] capable of stealing information from a victim accelerator through the interference between neighbouring two wires used by the victim and attacker. For mounting such attacks on the cloud, its infrastructure has to be known, i.e.…”
Section: Attacker Capabilitiesmentioning
confidence: 99%
“…For example, different directions of the propagation of clock signal may result into observable effects on the timing. In addition, complete isolation of regions should be achievable, so that interference between them and related attacks [31,52] can be prevented.…”
Section: Shared Use Of Fpgasmentioning
confidence: 99%
“…1) We show that the long wire leakage phenomenon persists in the Virtex UltraScale+ FPGA family found in many Xilinx-based cloud providers [23]. As we explain in Section II, UltraScale+ long wires differ significantly from those investigated in prior work [4], [5]. 2) We introduce a novel flip-flop-based RO and also evaluate a latch-based RO, both of which overcome combinatorial loop restrictions.…”
Section: Introductionmentioning
confidence: 98%
“…With the availability of FPGAs in public cloud infrastructures rapidly rising, and with FPGA designs becoming more sophisticated, several security concerns arise from the prospect of multi-tenant FPGA usage. IP core integration from multiple sources [4], [5], [13], shared FPGA resources between different users [4], [5], [9], [13], [16], [24], and CPU/FPGA hybrid designs [4], [5] enable previously-unexplored attacks, without the need for physical access to the FPGA boards.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation