Review of Side Channel Attacks and Countermeasures of FPGA Based Systems

Jun Yu Koh, T. Nandha Kumar
{"title":"Review of Side Channel Attacks and Countermeasures of FPGA Based Systems","authors":"Jun Yu Koh, T. Nandha Kumar","doi":"10.1109/SCOReD53546.2021.9652773","DOIUrl":null,"url":null,"abstract":"Field Programmable Gate Arrays (FPGAs) based systems are widely used in a range of applications including cryptography and machine learning model due to the rapid rate of hardware realizations at low cost. However, FPGAs based systems are subjected to vulnerabilities due to the side channel attacks. Recent studies have shown that vulnerabilities such as power leakage and long wires leakage can be utilised to extract secret key or information from the FPGAs. Which becomes a critical security concern for the data and Machine Learning model executing on the cloud computing service and data centres that includes FPGAs in their systems. Malicious users in these systems may utilised these vulnerabilities to perform a power side channel attacks to get confidential information or to create a malicious shutdown attack towards the systems. In this review paper, we presented the most recent side channel attacks focusing on power leakage and long wire leakage. Moreover, we present the countermeasures for protecting FPGAs from these attacks.","PeriodicalId":6762,"journal":{"name":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","volume":"1 1","pages":"102-107"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 19th Student Conference on Research and Development (SCOReD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCOReD53546.2021.9652773","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Field Programmable Gate Arrays (FPGAs) based systems are widely used in a range of applications including cryptography and machine learning model due to the rapid rate of hardware realizations at low cost. However, FPGAs based systems are subjected to vulnerabilities due to the side channel attacks. Recent studies have shown that vulnerabilities such as power leakage and long wires leakage can be utilised to extract secret key or information from the FPGAs. Which becomes a critical security concern for the data and Machine Learning model executing on the cloud computing service and data centres that includes FPGAs in their systems. Malicious users in these systems may utilised these vulnerabilities to perform a power side channel attacks to get confidential information or to create a malicious shutdown attack towards the systems. In this review paper, we presented the most recent side channel attacks focusing on power leakage and long wire leakage. Moreover, we present the countermeasures for protecting FPGAs from these attacks.
基于FPGA系统的侧信道攻击及对策综述
基于现场可编程门阵列(fpga)的系统由于硬件实现速度快,成本低,广泛应用于密码学和机器学习模型等一系列应用。然而,由于侧信道攻击,基于fpga的系统容易受到漏洞的影响。最近的研究表明,可以利用电源泄漏和长导线泄漏等漏洞从fpga中提取密钥或信息。这成为在云计算服务和数据中心上执行的数据和机器学习模型的关键安全问题,其中包括系统中的fpga。这些系统中的恶意用户可能利用这些漏洞执行电源侧信道攻击,以获取机密信息或对系统创建恶意关机攻击。在这篇综述文章中,我们介绍了最近的侧边通道攻击,重点是电源泄漏和长导线泄漏。此外,我们还提出了保护fpga免受这些攻击的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信