3 Remote - Power - Side-Channel - Attacks - On - FPGAs
3 Remote - Power - Side-Channel - Attacks - On - FPGAs
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MDAT.2024.3448371
Keywords—field programmable gate array, ring oscillator, sensitive logic that is co-resident on the same FPGA fabric,
power analysis attack, side-channel attack, system-on-chip targeting deployments where an FPGA is shared among mul-
tiple users or logic regions for efficiency (e.g., in a cloud
I. I NTRODUCTION AND BACKGROUND datacenter environment). We assume that the shared FPGA
Field Programmable Gate Arrays (FPGAs) are widely used has common security mechanisms to ensure isolation between
to accelerate sensitive applications in datacenters and beyond. different users; the attack and victim circuits are both logically
For example, Microsoft heavily utilizes FPGAs in its data- partitioned (i.e., there are no illicit connections between the
centers for tasks ranging from network security to machine two modules) and physically partitioned (i.e., with a ‘fence’
learning [1]. Amazon offers FPGA instances in its EC2 of unused configurable logic blocks) [3].
service, allowing customers to rent FPGAs and accelerator de- Secondly, an FPGA-to-CPU attack uses malicious FPGA
signs for applications like genomics sequencing. Furthermore, logic to extract a secret from a software process (including the
hardware vendors such as Intel and AMD have introduced kernel itself) running on a CPU within the same SoC. Here,
heterogeneous System-on-Chip (SoC) designs which integrate we assume an SoC architecture that contains both FPGA fabric
both processing cores and FPGA fabric in one silicon die. and traditional processing elements such as CPUs and GPUs.
These FPGA-SoCs allow applications to leverage both the We assume that the system has proper protection mechanisms
programmability of CPUs and efficiency of FPGAs in one (e.g., CPU privilege modes) to prevent direct accesses from
device, showing utility in diverse deployments ranging from the FPGA fabric to the rest of a system used by another user
medicine to defense. or process.
As these applications become increasingly reliant on FPGAs Demonstrating and understanding the mechanisms and lim-
to improve their performance and energy efficiency, systems itations of the FPGA remote power side channel is the first
are deploying both trusted and untrusted logic within the same step to mitigating this powerful class of attacks.
FPGA device. For example, in cloud FPGAs, untrusted user
logic is co-resident with privileged OS-like “shell” control II. T HE FPGA-BASED P OWER M ONITOR
logic. Meanwhile, recent works have proposed FPGA virtu-
alization and enclave-like mechanisms to share FPGAs and A. Operating Principle
compartmentalize trusted logic [2]. Understanding the security We first explore the principles behind how an on-chip power
implications of co-resident untrusted FPGA logic is essential. monitor can be built via software-programmed logic on a
To this end, this article explores a key security vulnerability modern FPGA.
we discovered in 2018 that can be exploited to perform power The power demanded by a CMOS circuit can be modeled
side-channel attacks in software, without requiring physical as the sum of the static and dynamic components of power
access or proximity to the target system. Power side-channel consumption. As power side-channel attacks often leverage
attacks infer confidential information based on the data- data-dependent changes in the power consumption, we only
dependent variations in a target system’s power consumption. focus on monitoring the dynamic power consumption, Pdyn .
In order to obtain power traces, attackers typically insert a low- For one CMOS cell, the average dynamic power consumption
impedance resistor in series with the power supply and use an can be modeled as the sum of charging and short-circuit power
2
oscilloscope to measure the power consumption as the voltage consumption, Pdyn = Pchrg +Psc , where Pchrg = αf CL VDD
drop across the resistor. Thus, these power side-channel attacks and Psc = αf VDD Ipeak tsc . α is the activity factor, f is the
historically required physical access to the target system. clock frequency, VDD is the supply voltage, CL is the load
In contrast, we assume a threat model where an adversary capacitance, Ipeak is the current peak caused by the switching
can program a part of an integrated FPGA (e.g., as a cloud event, and tsc is the short-circuit time. The dynamic power
FPGA tenant or via third-party IP core) and implement a increases proportionally with the activity of the circuit, α.
circuit of their choice. However, they have no physical access A power distribution network (PDN) converts and dis-
or proximity to the target system itself and therefore cannot tributes power from the power supply to individual circuit
directly measure physical properties such as power consump- components. The goal of the PDN is to provide a clean voltage
tion. Instead, the adversary can leverage the inherent properties supply resistant to varying current demands. To maintain a
of FPGA devices to create an on-chip power monitor using constant voltage, a PDN uses a voltage regulator to adjust the
the programmable logic of an FPGA (i.e., software-only), amount of supplied current and uses decoupling capacitors as
allowing them to measure dynamic power consumption with a buffer to handle current variations. However, the voltage
sufficient resolution to enable power analysis attacks. regulator and the decoupling capacitors cannot completely
We explore two types of attacks in this article. First, an hide current variations, and high switching activities often
FPGA-to-FPGA attack uses malicious FPGA logic to attack lead to transient voltage drops in the PDN of an FPGA. In
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on August 26,2024 at 11:37:38 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Design & Test. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MDAT.2024.3448371
8
1 T Q T Q T Q 10
enable RO Data
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on August 26,2024 at 11:37:38 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Design & Test. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MDAT.2024.3448371
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on August 26,2024 at 11:37:38 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Design & Test. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MDAT.2024.3448371
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on August 26,2024 at 11:37:38 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Design & Test. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MDAT.2024.3448371
R EFERENCES
[1] J. Fowers, K. Ovtcharov, M. Papamichael, T. Massengill, M. Liu, D. Lo,
S. Alkalay, M. Haselman, L. Adams, M. Ghandi, S. Heil, P. Patel,
A. Sapek, G. Weisz, L. Woods, S. Lanka, S. K. Reinhardt, A. M.
Caulfield, E. S. Chung, and D. Burger, “A configurable cloud-scale
DNN processor for real-time AI,” in Proceedings of the 45th Annual
International Symposium on Computer Architecture, ser. ISCA ’18.
Piscataway, NJ, USA: IEEE Press, 2018, pp. 1–14. [Online]. Available:
https://doi.org/10.1109/ISCA.2018.00012
[2] M. Zhao, M. Gao, and C. Kozyrakis, “Shef: Shielded enclaves for
cloud fpgas,” in Proceedings of the 27th ACM International Conference
on Architectural Support for Programming Languages and Operating
Systems, ser. ASPLOS ’22. New York, NY, USA: Association
for Computing Machinery, 2022, p. 1070–1085. [Online]. Available:
https://doi-org.stanford.idm.oclc.org/10.1145/3503222.3507733
[3] T. Huffmire, B. Brotherton, G. Wang, T. Sherwood, R. Kastner, T. Levin,
T. Nguyen, and C. Irvine, “Moats and drawbridges: An isolation
primitive for reconfigurable hardware based systems,” in 2007 IEEE
Symposium on Security and Privacy (S&P), 2007, pp. 281–295.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on August 26,2024 at 11:37:38 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Design & Test. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/MDAT.2024.3448371
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR. Downloaded on August 26,2024 at 11:37:38 UTC from IEEE Xplore. Restrictions apply.
© 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.