FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES
DOI:
https://doi.org/10.13154/tches.v2018.i3.44-68Keywords:
FPGA, DFA, chosen-plaintext, fault attack, on-chip, remote, multi-user, cloud, AESAbstract
With each new technology generation, the available resources on Field Programmable Gate Arrays increase, making them more attractive for partial access from multiple users. They get increasingly adopted as accelerators in various application domains, embedded in shared Systems on Chip or remote cloud services. Thus, some recent works have already explored Denial-of-Service and side-channel attacks, where an FPGA fabric is shared among multiple users. In this work, we show how fault attacks can be launched within an FPGA, through software-provided bitstreams alone. Excessive voltage drops can be generated from legitimate logic mapped into the FPGA to cause timing faults, reaching from spatially and logically isolated partitions of one to another user of the FPGA fabric. To cause this voltage drop, we first show how specific patterns to activate Ring Oscillators can cause timing failures in simple test designs on various FPGA boards. Subsequently, we analyze and adapt an existing fault model for the Advanced Encryption Standard to match the accuracy of our fault attack. In the same multi-user scenario, we show as a proof-of-concept how a successful Differential Fault Analysis attack on an AES module can be launched. We perform experiments on three FPGA boards of the same model and confirm that the attack adapts to all systems and is successful under process variation, but with different susceptibility to faults. The paper is concluded by validating the attack on another platform, and analyzing the vulnerability based on a timing analysis, proving the applicability to different devices.
Published
Issue
Section
License
Copyright (c) 2018 Jonas Krautter, Dennis R. E. Gnad, Mehdi B. Tahoori
This work is licensed under a Creative Commons Attribution 4.0 International License.