URI | http://purl.tuc.gr/dl/dias/FD2F3228-28CF-4E7F-807D-D1268A9E8DC8 | - |
Identifier | https://doi.org/10.1109/FPL57034.2022.00065 | - |
Identifier | https://ieeexplore.ieee.org/document/10035123 | - |
Language | en | - |
Extent | 6 pages | en |
Title | Assessing the effectiveness of active fences against SCAs for multi-tenant FPGAs | en |
Creator | Diktopoulos Christos | en |
Creator | Δικτοπουλος Χρηστος | el |
Creator | Georgopoulos Konstantinos | en |
Creator | Γεωργοπουλος Κωνσταντινος | el |
Creator | Brokalakis Andreas | en |
Creator | Μπροκαλακης Ανδρεας | el |
Creator | Christou Georgios | en |
Creator | Chrysos Grigorios | en |
Creator | Χρυσος Γρηγοριος | el |
Creator | Morianos Ioannis | en |
Creator | Μοριανος Ιωαννης | el |
Creator | Ioannidis Sotirios | en |
Creator | Ιωαννιδης Σωτηριος | el |
Publisher | Institute of Electrical and Electronics Engineers | en |
Description | This work was supported by EnerMan, which is a EU H2020 RIA funded program under Grant Agreement 958478. | en |
Content Summary | The rising use of FPGAs, in the context of cloud computing, has created security concerns. Previous works have shown that malicious users can implement voltage fluctuation sensors and mount successful power analysis attacks against cryptographic algorithms that share the same Power Distribution Network (PDN). So far, masking and hiding schemes are the two main mitigation strategies against such attacks and previous work has shown that the use of an active fence of Ring Oscillators (ROs) holds the potential for constituting an effective hiding countermeasure if placed between two adversary users. Nevertheless, developing an effective proposition against remote Side-Channel Attacks (SCAs) remains an open research topic. This work presents the mapping of an intra-FPGA adversary scenario on a Xilinx UltraScale+ MPSoC to assess the effectiveness of the Ring Oscillator active fence countermeasure. We compare different active fence configurations, with a varying number of Ring Oscillators, while using a new, resource efficient, activation method aiming at the achievement of noise injection hiding. The results show that by using our active fence scheme, which exhibits lower area overhead and lower power consumption than the algorithm under attack, the side-channel leakage is reduced to such a degree that the amount of traces that need to be collected for a successful attack is more than ten times higher compared to no fence present. Moreover, this work presents qualitative results that FPGA cloud providers can consider in order to assess the benefits gained through the deployment of active fence mechanisms within their platforms for multi-tenant services. | en |
Type of Item | Πλήρης Δημοσίευση σε Συνέδριο | el |
Type of Item | Conference Full Paper | en |
License | http://creativecommons.org/licenses/by/4.0/ | en |
Date of Item | 2024-09-25 | - |
Date of Publication | 2022 | - |
Subject | Cloud | en |
Subject | Computing | en |
Subject | FPGA | en |
Subject | Multi tenant | en |
Subject | Security | en |
Subject | Power | en |
Subject | Side channel | en |
Subject | Attack | en |
Subject | Countermeasure | en |
Subject | Hiding | en |
Bibliographic Citation | C. Diktopoulos, K. Georgopoulos, A. Brokalakis, G. Christou, G. Chrysos, I. Morianos and S. Ioannidis, "Assessing the effectiveness of active fences against SCAs for multi-tenant FPGAs," in Proceedings of the 32nd International Conference on Field-Programmable Logic and Applications (FPL 2022), Belfast, United Kingdom, 2022, pp. 391-396, doi: 10.1109/FPL57034.2022.00065. | en |