Characterizing Power Distribution Attacks in Multi-User FPGA - - PowerPoint PPT Presentation

characterizing power distribution attacks in multi user
SMART_READER_LITE
LIVE PREVIEW

Characterizing Power Distribution Attacks in Multi-User FPGA - - PowerPoint PPT Presentation

Characterizing Power Distribution Attacks in Multi-User FPGA Environments George Provelengios, Daniel Holcomb, and Russell Tessier Department of Electrical and Computer Engineering University of Massachusetts Amherst (Funded by a grand from


slide-1
SLIDE 1

Department of Electrical and Computer Engineering University of Massachusetts Amherst

George Provelengios, Daniel Holcomb, and Russell Tessier

Department of Electrical and Computer Engineering University of Massachusetts Amherst (Funded by a grand from Intel’s Corporate Research Council)

Characterizing Power Distribution Attacks in Multi-User FPGA Environments

slide-2
SLIDE 2

2 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Overview

➢ Two tenants are using simultaneously the device ➢ Tenant A (attacker) consumes power aggressively in an attempt to induce timing faults in tenant B (victim) Threat model:

✓ Tenants are spatially isolated but share the FPGA power distribution network (PDN) ✓ Tenants do not have physical access to the board ✓ The tools used for interacting with the FPGA are secure

QSFP Spatial Isolation USB Eth I2C PCIe DMA MMIO Shell

FPGA fabric

Victim ... ... Attacker User Space

Shared PDN

On-board Regulator i

Vin

slide-3
SLIDE 3

3 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Contribution

▪ We investigate on-chip voltage attacks and specifically how their impact depends on: ➢ Duration of voltage disruption ➢ Consumed power by attacker ➢ Distance between attacker & victim ▪ We evaluate the ability of power wasting circuits to induce timing faults to victim ▪ We examine the use of small on-chip voltage sensors to quickly identify the location of the attacker

slide-4
SLIDE 4

4 Department of Electrical and Computer Engineering University of Massachusetts Amherst

E36312A benchtop power supply MOSX4154A

  • scilloscope

Terasic DE1-SoC board - Cyclone V FPGA (28nm)

A B

Characterization platform and experimentation setup

1μH inductor

▪ Two DE1-SoC boards (Cyclone V FPGA)

➢ A: for calibrating the sensors ➢ B: for characterizing on-chip voltage attacks

▪ A benchtop power supply for controlling the input voltage ▪ An oscilloscope for measuring the on-board voltage (testpad VCC1P1)

LTC3608 switching regulator (617KHz)

slide-5
SLIDE 5

5 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Voltage sensor architecture

▪ A regular rectangular grid of 46 sensors ▪ 19 inverting stages:

✓ Meet timing constraints ✓ Minimize local effects1 ✓ Fit in a single CV LAB

▪ Resolution: 1 part in 1000

1 M. Barbareschi, G. Di Natale, and L. Torres, “Implementation and analysis of ring oscillator circuits on Xilinx FPGAs,”

in Hardware Security and Trust. N. Sklavos, R. Chaves, G. Di Natale, and F. Regazzoni, Eds. Springer, 2017, ch. 12, pp. 237-251

Cyclone V Array of on-die voltage sensors

Controller reads and resets all the sensors simultaneously in every sampling period

En

...

Frequency Counter (20-bit)

En

RO counts

ALM#0 ALM#9

19-stage RO

Sensor

Cyclone V LAB

Rst

Rst

  • Avg. fRO = 105MHz
  • Sam. period = 10μs

Resolution = 0.1% Specifications

slide-6
SLIDE 6

6 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Sensor calibration

▪ To use ROs as on-chip voltage sensors:

➢ Sweep the input voltage (780mV – 1.1V) and record: ✓ Voltage at FPGA power pin ✓ RO counts from on-chip sensors

▪ Minimize the power drawn by the FPGA during measurements

Consistent trend

slide-7
SLIDE 7

7 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Attacker circuitry

▪ 𝑄𝑒𝑧𝑜 = 𝐷 × 𝑊

𝐸𝐸 2 × 𝑔 𝑇𝑋

▪ 1-stage ROs as power wasters ▪ In an area of 1,408 LABs (44x32) fit up to 12K PWs ▪ Placed uniformly at random locations in the attack area ▪ Power/instance is diminished as the number of PWs increases

160 1600 3200 4800 6400 1.13 1.02 0.91 0.84 0.75 Power /

  • Inst. [mW]

LUT LUT Cyclone V ALM ... I0 I1 I2 I7 Toggle Output Toggle Output Enable

Number of Instances

Hit the 5A current limit of the E36312A benchtop supply

slide-8
SLIDE 8

8 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Physical characterization of voltage drop

▪ Characterize disturbance as a function of:

  • disruption time
  • distance to center of PW

(7 locations examined)

drops by 26%

On-chip

slide-9
SLIDE 9

9 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Physical characterization of voltage drop

▪ Characterize disturbance as a function of:

  • disruption time
  • distance to center of PW

(7 locations examined)

drops by 26%

83mV ∆𝑗= 2.5𝐵 60μs

On-chip On-board

▪ Voltage drop across the on- board inline inductor

slide-10
SLIDE 10

10 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Intensity and distance

▪ Power consumed by attacker (160PWs -> 12K PWs) ▪ The 83mV voltage drop across the inductor impacts every part of the chip ▪ The victim will notice the drop regardless of its location on the chip

53

53 columns away the voltage drops to 967mV in the strongest attack

slide-11
SLIDE 11

11 Department of Electrical and Computer Engineering University of Massachusetts Amherst

...

+ 1 + 1 + 1 1 + Propagating carry FAn-1 FAn-2 FAn-3 FA0 1

...

Clock

Characterizing timing faults

Clock

20ns

Propagation Delay Propagation Delay

  • Neg. Slack
  • Pos. Slack

Increased delay time due to attack

Error free paths in absence of attack

▪ Voltage drop causes delay of combinational logic to increase ▪ Wrong values captured if paths do not complete before capturing clock edge arrives ▪ Must overcome conservative timing models ▪ Use ripple carry adder as a representative test circuit can sensitize any desired path length

slide-12
SLIDE 12

12 Department of Electrical and Computer Engineering University of Massachusetts Amherst 12

Inducing timing faults

42

Undershoot Steady state

▪ 12K PWs randomly placed in an area of 1,408 LABs (44x32) ▪ Examine different distances in respect to attack center:

  • 22, 26, 30, 35, 38, 42, 47,

50, and 54 LAB columns away

  • Sensitize different path

lengths: 49, 54, 59, 64, 69, and 74

▪ Faults occurred even in 42 columns away

Victim Attacker

slide-13
SLIDE 13

13 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Mapping the on-chip voltage drop

▪ Using 46 on-chip sensors for deriving the voltage contours

  • f the chip

▪ Varying the magnitude of disturbance and location of attacker ▪ Center of attack:

  • 12K PWs: 825mV
  • 3.2K PWs: 975mV

▪ Farthest corner of the chip:

  • 12K PWs: 975mV
  • 3.2K PWs: 1.050V

(A) 12K power waster attack (B) 3.2K power waster attack

slide-14
SLIDE 14

14 Department of Electrical and Computer Engineering University of Massachusetts Amherst

Locating the attack area

▪ The disturbance of the shared PDN reveals the location of the attacker ▪ Evaluate how many sensors required to find its location ▪ 20 sensors are sufficient to identify the attacker

(A) 12K power waster attack (B) 3.2K power waster attack

  • Num. RO

Sensors ALMs (Avail.:32,070) Flip-flops (Avail.: 128,280) 10 390 (1.2%) 200 (<1%) 20 780 (2.4%) 400 (<1%) 30 1,170 (3.6%) 600 (<1%) 40 1,560 (4.9%) 800 (<1%) 46 1,794 (5.6%) 920 (<1%) Controller 430 (1.3%) 111 (<1%) Resource utilization: Cyclone V 5CSEMA5F31C6

slide-15
SLIDE 15

15 Department of Electrical and Computer Engineering University of Massachusetts Amherst 15

Summary

▪ Using a small number of RO-based

  • n-chip sensors we characterized on-

chip FPGA voltage attacks ▪ Combining iR voltage drop with drop caused by inductance can be used to attack circuits far from the power wasting area ▪ Spatial isolation between tenants is insufficient for protecting against PDN attacks ▪ A malicious tenant cannot mask its identity and can be located with less than 5% of FPGA logic

slide-16
SLIDE 16

16 Department of Electrical and Computer Engineering University of Massachusetts Amherst 16

▪ Using a small number of RO-based on- chip sensors we characterized on-chip FPGA voltage attacks ▪ Combining iR voltage drop with drop caused by inductance can be used to attack circuits far from the power wasting area ▪ Spatial isolation between tenants is insufficient for protecting against PDN attacks ▪ A malicious tenant cannot mask its identity and can be located with less than 5% of FPGA logic

Thank You Questions?