FPGANeedle: Precise Remote Fault Attacks from FPGA to CPU

10Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

FPGA as general-purpose accelerators can greatly improve system efficiency and performance in cloud and edge devices alike. However, they have recently become the focus of remote attacks, such as fault and side-channel attacks from one to another user of a part of the FPGA fabric. In this work, we consider system-on-chip platforms, where an FPGA and an embedded processor core are located on the same die. We show that the embedded processor core is vulnerable to voltage drops generated by the FPGA logic. Our experiments demonstrate the possibility of compromising the data transfer from external DDR memory to the processor cache hierarchy. Furthermore, we were also able to fault and skip instructions executed on an ARM Cortex-A9 core. The FPGA based fault injection is shown precise enough to recover the secret key of an AES T-tables implementation found in the mbedTLS library.

Cite

CITATION STYLE

APA

Gross, M., Krautter, J., Gnad, D., Gruber, M., Sigl, G., & Tahoori, M. (2023). FPGANeedle: Precise Remote Fault Attacks from FPGA to CPU. In Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC (pp. 358–364). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1145/3566097.3568352

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free