Microarchitectural vulnerabilities introduced, exploited, and accelerated by heterogeneous FPGA-CPU platforms

0Citations
Citations of this article
N/AReaders
Mendeley users who have this article in their library.
Get full text

Abstract

After years of development, FPGAs finally made an appearance on multi-tenant cloud servers in the late 2010s. Research in micro-architectural attacks has uncovered a variety of vulnerabilities on shared compute devices like CPUs and GPUs which pose a substantial thread to cloud service providers and customers alike, but heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack vectors and vulnerabilities. The FPGAs now available from major cloud services use technologies like direct memory access and coherent caching to offer high-throughput, low-latency, and highly scalable FPGA-FPGA and FPGA-CPU coprocessing for heavy workloads. This chapter explores how FPGAs with access to these microarchitectural features can accelerate attacks against the host memory. It points out cache timing side channels and demonstrates a performant Rowhammer attack against a well-known RSA variant through direct memory access.

Cite

CITATION STYLE

APA

Tiemann, T., Weissman, Z., Eisenbarth, T., & Sunar, B. (2023). Microarchitectural vulnerabilities introduced, exploited, and accelerated by heterogeneous FPGA-CPU platforms. In Security of FPGA-Accelerated Cloud Computing Environments (pp. 203–237). Springer International Publishing. https://doi.org/10.1007/978-3-031-45395-3_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free