FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable - - PowerPoint PPT Presentation

fpgahammer remote voltage fault attacks on shared fpgas
SMART_READER_LITE
LIVE PREVIEW

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable - - PowerPoint PPT Presentation

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES Jonas Krautter, Dennis R.E. Gnad, Mehdi B. Tahoori | 10.09.2018 INSTITUTE OF COMPUTER ENGINEERING CHAIR OF DEPENDABLE NANO COMPUTING www.kit.edu KIT Die


slide-1
SLIDE 1

INSTITUTE OF COMPUTER ENGINEERING – CHAIR OF DEPENDABLE NANO COMPUTING

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES

Jonas Krautter, Dennis R.E. Gnad, Mehdi B. Tahoori | 10.09.2018

KIT – Die Forschungsuniversität in der Helmholtz-Gemeinschaft

www.kit.edu

slide-2
SLIDE 2

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Motivation

More resources per FPGA ⇒ Multi-user environments:

Amazon, Microsoft and introduce FPGA usage in cloud computing System-on-Chip (SoC) variants, tightly coupled FPGA based systems (Xilinx PYNQ, Intel Xeon FPGA, Intel/Altera-SoCs...) Accelerators deployed to partitions through partial reconfiguration

⇒ Multi-tenant FPGAs

slide-3
SLIDE 3

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Motivation

More resources per FPGA ⇒ Multi-user environments:

Amazon, Microsoft and introduce FPGA usage in cloud computing System-on-Chip (SoC) variants, tightly coupled FPGA based systems (Xilinx PYNQ, Intel Xeon FPGA, Intel/Altera-SoCs...) Accelerators deployed to partitions through partial reconfiguration

⇒ Multi-tenant FPGAs New attack scenarios:

Passive on-chip side-channels1 Denial-of-Service2 This work: Fault attacks ...

1Schellenberg et al., ”An Inside Job: Remote Power Analysis Attacks on FPGAs”, DATE 2018 2Gnad et al., ”Voltage drop-based fault attacks on FPGAs using valid bitstreams”, FPL 2017

slide-4
SLIDE 4

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Motivation

More resources per FPGA ⇒ Multi-user environments:

Amazon, Microsoft and introduce FPGA usage in cloud computing System-on-Chip (SoC) variants, tightly coupled FPGA based systems (Xilinx PYNQ, Intel Xeon FPGA, Intel/Altera-SoCs...) Accelerators deployed to partitions through partial reconfiguration

⇒ Multi-tenant FPGAs New attack scenarios:

Passive on-chip side-channels1 Denial-of-Service2 This work: Fault attacks ...

Proof-of-Concept work: Successful DFA on AES

1Schellenberg et al., ”An Inside Job: Remote Power Analysis Attacks on FPGAs”, DATE 2018 2Gnad et al., ”Voltage drop-based fault attacks on FPGAs using valid bitstreams”, FPL 2017

slide-5
SLIDE 5

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Threat model

Shared FPGA fabric ⇒ Shared Power Distribution Network (PDN)

slide-6
SLIDE 6

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Threat model

Shared FPGA fabric ⇒ Shared Power Distribution Network (PDN) Attacker and victim design logically isolated

slide-7
SLIDE 7

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Threat model

Shared FPGA fabric ⇒ Shared Power Distribution Network (PDN) Attacker and victim design logically isolated Victim software process has a public interface

slide-8
SLIDE 8

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Threat model

Shared FPGA fabric ⇒ Shared Power Distribution Network (PDN) Attacker and victim design logically isolated Victim software process has a public interface Chosen-Plaintext Attack scenario

slide-9
SLIDE 9

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Outline

1

Background

2

Fault Injection and Analysis

3

Experimental Setup

4

Results

5

Discussion and Future Work

6

Conclusion

slide-10
SLIDE 10

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Outline

1

Background

2

Fault Injection and Analysis

3

Experimental Setup

4

Results

5

Discussion and Future Work

6

Conclusion

slide-11
SLIDE 11

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Power Distribution Network (PDN)

Interconnections from the voltage regulator down to logic elements Model: RLC-mesh (Resistive, Inductive and Capacitive elements)

slide-12
SLIDE 12

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Power Distribution Network (PDN)

Interconnections from the voltage regulator down to logic elements Model: RLC-mesh (Resistive, Inductive and Capacitive elements) Law of Inductance: Vdrop = I · R + L · dI

dt

slide-13
SLIDE 13

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Power Distribution Network (PDN)

Interconnections from the voltage regulator down to logic elements Model: RLC-mesh (Resistive, Inductive and Capacitive elements) Law of Inductance: Vdrop = I · R + L · dI

dt

High current variation ⇒ Power supply voltage variation

slide-14
SLIDE 14

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Power Distribution Network (PDN)

Interconnections from the voltage regulator down to logic elements Model: RLC-mesh (Resistive, Inductive and Capacitive elements) Law of Inductance: Vdrop = I · R + L · dI

dt

High current variation ⇒ Power supply voltage variation Lower supply voltage ⇒ Timing faults

slide-15
SLIDE 15

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Malicious Logic

Logic element to cause high current variation2: Ring Oscillators (ROs)

2Gnad et al., ”Voltage drop-based fault attacks on FPGAs using valid bitstreams”, FPL 2017

slide-16
SLIDE 16

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Malicious Logic

Logic element to cause high current variation2: Ring Oscillators (ROs) Oscillation ⇒ Gate switching ⇒ Current variation ⇒ Voltage drop

2Gnad et al., ”Voltage drop-based fault attacks on FPGAs using valid bitstreams”, FPL 2017

slide-17
SLIDE 17

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Malicious Logic

Logic element to cause high current variation2: Ring Oscillators (ROs) Oscillation ⇒ Gate switching ⇒ Current variation ⇒ Voltage drop RO-grid must be toggled in a very specific way (freq, duty-cycle, delay)

2Gnad et al., ”Voltage drop-based fault attacks on FPGAs using valid bitstreams”, FPL 2017

slide-18
SLIDE 18

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Malicious Logic

Logic element to cause high current variation2: Ring Oscillators (ROs) Oscillation ⇒ Gate switching ⇒ Current variation ⇒ Voltage drop RO-grid must be toggled in a very specific way (freq, duty-cycle, delay)

⇒ Calibration of fault injection parameters required

5 10 15 20

Time (s)

0.95 1.00 1.05 1.10 1.15 1.20

VCC (V)

VCC min recommended VCC max recommended FPGA supply voltage VCC during frequency scan

2Gnad et al., ”Voltage drop-based fault attacks on FPGAs using valid bitstreams”, FPL 2017

slide-19
SLIDE 19

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Malicious Logic

Logic element to cause high current variation2: Ring Oscillators (ROs) Oscillation ⇒ Gate switching ⇒ Current variation ⇒ Voltage drop RO-grid must be toggled in a very specific way (freq, duty-cycle, delay)

⇒ Calibration of fault injection parameters required

5 10 15 20

Time (s)

0.95 1.00 1.05 1.10 1.15 1.20

VCC (V)

VCC min recommended VCC max recommended Toggle frequency decrease FPGA supply voltage VCC during frequency scan

2Gnad et al., ”Voltage drop-based fault attacks on FPGAs using valid bitstreams”, FPL 2017

slide-20
SLIDE 20

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Outline

1

Background

2

Fault Injection and Analysis

3

Experimental Setup

4

Results

5

Discussion and Future Work

6

Conclusion

slide-21
SLIDE 21

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection and Analysis

Differential Fault Analysis on AES3

3Piret et al., ”A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad”, CHES 2003

slide-22
SLIDE 22

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection and Analysis

Differential Fault Analysis on AES3 Original scheme: Single-byte faults before 8th round

⇒ All output bytes faulty

3Piret et al., ”A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad”, CHES 2003

slide-23
SLIDE 23

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection and Analysis

Differential Fault Analysis on AES3 Original scheme: Single-byte faults before 8th round

⇒ All output bytes faulty

Injection requires high precision

⇒ Fault injection before 9th round

3Piret et al., ”A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad”, CHES 2003

slide-24
SLIDE 24

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection and Analysis

Differential Fault Analysis on AES3 Original scheme: Single-byte faults before 8th round

⇒ All output bytes faulty

Injection requires high precision

⇒ Fault injection before 9th round

Successful injection can be verified

3Piret et al., ”A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad”, CHES 2003

slide-25
SLIDE 25

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection and Analysis

Attacker issues encryption request to get correct ciphertext

slide-26
SLIDE 26

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection and Analysis

Attacker issues encryption request to get correct ciphertext Attacker issues encryption requests while activating RO grid

slide-27
SLIDE 27

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection and Analysis

Attacker issues encryption request to get correct ciphertext Attacker issues encryption requests while activating RO grid Fault injection is calibrated until desired faults appear

slide-28
SLIDE 28

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection and Analysis

Attacker issues encryption request to get correct ciphertext Attacker issues encryption requests while activating RO grid Fault injection is calibrated until desired faults appear Calibration is done only once for a specific board

slide-29
SLIDE 29

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Outline

1

Background

2

Fault Injection and Analysis

3

Experimental Setup

4

Results

5

Discussion and Future Work

6

Conclusion

slide-30
SLIDE 30

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Experimental Setup

RO grid AES ARM CPU

FPGA boards: 3× Terasic DE1-SoC, 1× Terasic DE0-Nano-SoC

3 boards of the same type 2 different boards

⇒ Show generality of attack Cyclone V FPGA and ARM Cortex-A9 on one chip Linux environment on ARM Cortex-A9

slide-31
SLIDE 31

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Experimental Setup

RO grid AES ARM CPU

FPGA boards: 3× Terasic DE1-SoC, 1× Terasic DE0-Nano-SoC

3 boards of the same type 2 different boards

⇒ Show generality of attack Cyclone V FPGA and ARM Cortex-A9 on one chip Linux environment on ARM Cortex-A9 Entire threat model in one SoC:

Attacker and victim software on ARM core Respective IP cores on FPGA fabric

slide-32
SLIDE 32

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Experimental Setup

RO grid AES ARM CPU

FPGA boards: 3× Terasic DE1-SoC, 1× Terasic DE0-Nano-SoC

3 boards of the same type 2 different boards

⇒ Show generality of attack Cyclone V FPGA and ARM Cortex-A9 on one chip Linux environment on ARM Cortex-A9 Entire threat model in one SoC:

Attacker and victim software on ARM core Respective IP cores on FPGA fabric

Fault injection on SoC, Key recovery on PC

slide-33
SLIDE 33

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Outline

1

Background

2

Fault Injection and Analysis

3

Experimental Setup

4

Results

5

Discussion and Future Work

6

Conclusion

slide-34
SLIDE 34

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection Rate vs #RO

30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

Logic utilization by attacker design (% of total LUTs)

100 101 102 103 104 105

#faults per million requests

DE1-SoC-A

Measured total amount of faults Ftot Measured amount of usable faults FDFA

Experiments on DE1-SoC, design fully constrained

slide-35
SLIDE 35

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection Rate vs #RO

30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

Logic utilization by attacker design (% of total LUTs)

100 101 102 103 104 105

#faults per million requests

DE1-SoC-A

Measured total amount of faults Ftot Measured amount of usable faults FDFA

Experiments on DE1-SoC, design fully constrained Evaluate usable (for DFA) faults and total amount of faults

slide-36
SLIDE 36

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection Rate vs #RO

30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

Logic utilization by attacker design (% of total LUTs)

100 101 102 103 104 105

#faults per million requests

DE1-SoC-A

Measured total amount of faults Ftot Measured amount of usable faults FDFA

Experiments on DE1-SoC, design fully constrained Evaluate usable (for DFA) faults and total amount of faults Injection rate increases with amount of ROs

slide-37
SLIDE 37

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection Rate vs #RO

30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

Logic utilization by attacker design (% of total LUTs)

100 101 102 103 104 105

#faults per million requests

DE1-SoC-A

Measured total amount of faults Ftot Measured amount of usable faults FDFA

Experiments on DE1-SoC, design fully constrained Evaluate usable (for DFA) faults and total amount of faults Injection rate increases with amount of ROs Injection accuracy decreases after a certain amount

slide-38
SLIDE 38

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection Rate vs #RO

100 101 102 103 104 105

DE1-SoC-A

100 101 102 103 104 105

#faults per million requests DE1-SoC-B

30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

Logic utilization by attacker design (% of total LUTs)

100 101 102 103 104 105

DE1-SoC-C

Extended experiments: 3 different boards

slide-39
SLIDE 39

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection Rate vs #RO

100 101 102 103 104 105

DE1-SoC-A

100 101 102 103 104 105

#faults per million requests DE1-SoC-B

30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

Logic utilization by attacker design (% of total LUTs)

100 101 102 103 104 105

DE1-SoC-C

Extended experiments: 3 different boards All boards vulnerable, Calibration finds params

slide-40
SLIDE 40

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Fault Injection Rate vs #RO

100 101 102 103 104 105

DE1-SoC-A

100 101 102 103 104 105

#faults per million requests DE1-SoC-B

30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50

Logic utilization by attacker design (% of total LUTs)

100 101 102 103 104 105

DE1-SoC-C

Extended experiments: 3 different boards All boards vulnerable, Calibration finds params Process variation ⇒ Different optimal #RO

slide-41
SLIDE 41

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Key Recovery on 5000 random keys

Recovered keys 2 4 232 233 264

Amount of key candidates remaining for each key

100 101 102 103 104 105

#keys

95.6% 2.6% 0.1% 1.9% 0.1% 0.0% 87.9% 2.9% 0.1% 8.7% 0.2% 0.5% 95.7% 2.2% 0.1% 2.0% 0.1% 0.0% DE1-SoC-A DE1-SoC-B DE1-SoC-C

Experiments on DE1-SoC with best fault injection configuration

slide-42
SLIDE 42

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Key Recovery on 5000 random keys

Recovered keys 2 4 232 233 264

Amount of key candidates remaining for each key

100 101 102 103 104 105

#keys

95.6% 2.6% 0.1% 1.9% 0.1% 0.0% 87.9% 2.9% 0.1% 8.7% 0.2% 0.5% 95.7% 2.2% 0.1% 2.0% 0.1% 0.0% DE1-SoC-A DE1-SoC-B DE1-SoC-C

Experiments on DE1-SoC with best fault injection configuration Majority of 5000 keys can be recovered

slide-43
SLIDE 43

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Key Recovery on 5000 random keys

Recovered keys 2 4 232 233 264

Amount of key candidates remaining for each key

100 101 102 103 104 105

#keys

95.6% 2.6% 0.1% 1.9% 0.1% 0.0% 87.9% 2.9% 0.1% 8.7% 0.2% 0.5% 95.7% 2.2% 0.1% 2.0% 0.1% 0.0% DE1-SoC-A DE1-SoC-B DE1-SoC-C

Experiments on DE1-SoC with best fault injection configuration Majority of 5000 keys can be recovered Unrecovered keys due to multi-byte faults

slide-44
SLIDE 44

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Outline

1

Background

2

Fault Injection and Analysis

3

Experimental Setup

4

Results

5

Discussion and Future Work

6

Conclusion

slide-45
SLIDE 45

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Discussion and Future Work

Attack on fully constrained design on DE1-SoC with < 50% resources

slide-46
SLIDE 46

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Discussion and Future Work

Attack on fully constrained design on DE1-SoC with < 50% resources Smaller DE0-Nano-SoC: Fully constrained design not vulnerable

⇒ Not all devices are equally vulnerable

slide-47
SLIDE 47

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Discussion and Future Work

Attack on fully constrained design on DE1-SoC with < 50% resources Smaller DE0-Nano-SoC: Fully constrained design not vulnerable

⇒ Not all devices are equally vulnerable

Alternatives to using ROs may exist

slide-48
SLIDE 48

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Discussion and Future Work

Attack on fully constrained design on DE1-SoC with < 50% resources Smaller DE0-Nano-SoC: Fully constrained design not vulnerable

⇒ Not all devices are equally vulnerable

Alternatives to using ROs may exist Attack may be extended to hard cores (ARM SoC)

slide-49
SLIDE 49

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Discussion and Future Work

Attack on fully constrained design on DE1-SoC with < 50% resources Smaller DE0-Nano-SoC: Fully constrained design not vulnerable

⇒ Not all devices are equally vulnerable

Alternatives to using ROs may exist Attack may be extended to hard cores (ARM SoC) Possible mitigation:

Internal sensors Bitstream checking Voltage islands

slide-50
SLIDE 50

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Outline

1

Background

2

Fault Injection and Analysis

3

Experimental Setup

4

Results

5

Discussion and Future Work

6

Conclusion

slide-51
SLIDE 51

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Conclusion

High precision fault injection on shared FPGAs is possible

slide-52
SLIDE 52

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Conclusion

High precision fault injection on shared FPGAs is possible Logical isolation is not enough to prevent manipulation

slide-53
SLIDE 53

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Conclusion

High precision fault injection on shared FPGAs is possible Logical isolation is not enough to prevent manipulation Threat model must be considered for FPGA multi-user environments

slide-54
SLIDE 54

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Conclusion

High precision fault injection on shared FPGAs is possible Logical isolation is not enough to prevent manipulation Threat model must be considered for FPGA multi-user environments Mitigation may require new/modified hardware

slide-55
SLIDE 55

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Thank you for your attention!

slide-56
SLIDE 56

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Additional Slides – Complete Scan Flow

slide-57
SLIDE 57

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Additional Slides – Slack Dependent Analysis

3 2 1 1 2 3

slack (ns)

Reported worst-case setup slack Reported best-case setup slack 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160

AES clock frequency fop (MHz)

101 102 103 104 105

#faults per million requests

Reference worst-case setup slack on DE1-SoC for fOP = 111 MHz

slide-58
SLIDE 58

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Additional Slides – Slack Dependent Analysis

3 2 1 1 2 3

slack (ns)

Measured amount of usable faults FDFA Measured total amount of faults Ftot Reported worst-case setup slack Reported best-case setup slack 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160

AES clock frequency fop (MHz)

101 102 103 104 105

#faults per million requests

Reference worst-case setup slack on DE1-SoC for fOP = 111 MHz

slide-59
SLIDE 59

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Additional Slides – Injection Process

0.95 1.00 1.05 1.10 1.15 1.20 VCC (V) VCC min recommended VCC max recommended RO activation toggles VCC fluctuation 1 aes_rst_n AES encryption starts 0.0 0.5 1.0 1.5 2.0 Time (µs) 1 ro_ena

Externally measured FPGA supply voltage VCC during fault injection AES reset logic signal (active low) RO grid activation signal

slide-60
SLIDE 60

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Additional Slides – RO Floorplan

ROs Virtual Pins

slide-61
SLIDE 61

FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs

  • J. Krautter, D.R.E. Gnad

and M.B. Tahoori

Additional Slides – Adder Test Design