Power-hammering through Glitch Amplification - Attacks and Mitigation

35Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent work on FPGA hardware security showed a substantial potential risk through power-hammering, which uses high switching activity in order to create excessive dynamic power loads. Virtually all present power-hammering attack scenarios are based on some kind of ring oscillators for which mitigation strategies exist. In this paper, we use a different strategy to create excessive dynamic power consumption: glitch amplification. By carefully designing XOR trees, fast switching wires can be implemented that, while driving high fan-out nets, can draw enough power to crash an FPGA. In addition to the attack (which is crashing an Ultra96 board), we will present a scanner for detecting malicious glitch amplifying FPGA designs.

Cite

CITATION STYLE

APA

Matas, K., La, T. M., Pham, K. D., & Koch, D. (2020). Power-hammering through Glitch Amplification - Attacks and Mitigation. In Proceedings - 28th IEEE International Symposium on Field-Programmable Custom Computing Machines, FCCM 2020 (pp. 65–69). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/FCCM48280.2020.00018

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free