{"title":"Analysis of Geometrical Parameters for Remote Side-Channel Attacks on Multi-Tenant FPGAs","authors":"Milad Salimian, A. Jahanian","doi":"10.1109/ISCISC51277.2020.9261904","DOIUrl":null,"url":null,"abstract":"Considering the dependency between the power consumption of implemented cryptographic algorithms and the data being processed, side-channel analysis methods can reveal the secret information of these systems. It was previously thought that data acquisition of dynamic power needs physical access to these systems, but recent studies show, it is possible to gather information about power consumption from FPGAs without any physical access. High flexibilities of modern FPGAs cause that they are used for cloud accelerator in Platform as a Service (PaaS) system; however, new serious vulnerabilities emerged for these platforms. Although there are some reports about how switching activities from one region of FPGA affect other regions, details of this technique are not analyzed. In this paper, we analyzed the strength of this kind of attack and examined the impact of geometrical and electrical parameters of the victim/attacker modules on the efficiency of this attack. Experimental results and analyses show that the relational location, and the distance of victim/attacker modules, have considerable impacts on the quality of attack. Results of this analysis can help the FPGA manufacturer and IP developers to protect their systems against this serious attack.","PeriodicalId":206256,"journal":{"name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC51277.2020.9261904","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Considering the dependency between the power consumption of implemented cryptographic algorithms and the data being processed, side-channel analysis methods can reveal the secret information of these systems. It was previously thought that data acquisition of dynamic power needs physical access to these systems, but recent studies show, it is possible to gather information about power consumption from FPGAs without any physical access. High flexibilities of modern FPGAs cause that they are used for cloud accelerator in Platform as a Service (PaaS) system; however, new serious vulnerabilities emerged for these platforms. Although there are some reports about how switching activities from one region of FPGA affect other regions, details of this technique are not analyzed. In this paper, we analyzed the strength of this kind of attack and examined the impact of geometrical and electrical parameters of the victim/attacker modules on the efficiency of this attack. Experimental results and analyses show that the relational location, and the distance of victim/attacker modules, have considerable impacts on the quality of attack. Results of this analysis can help the FPGA manufacturer and IP developers to protect their systems against this serious attack.