Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet extremely difficult to achieve, prerequisite to validate a complete board-level system for safe and sec...
Saved in:
Published in | 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) pp. 1 - 7 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
ACM
01.11.2018
|
Subjects | |
Online Access | Get full text |
ISSN | 1558-2434 |
DOI | 10.1145/3240765.3240841 |
Cover
Loading…
Abstract | The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet extremely difficult to achieve, prerequisite to validate a complete board-level system for safe and secure operation. An increasing risk is that most chips nowadays run software or firmware, typically updated throughout the system lifetime, making it practically impossible to validate the full system at every given point in the manufacturing, integration and operational life cycle. This risk is elevated in devices that run 3rd party firmware. In this paper we show that an FPGA used as a common accelerator in various boards can be reprogrammed by software to introduce a sensor, suitable as a remote power analysis side-channel attack vector at the board-level. We show successful power analysis attacks from one FPGA on the board to another chip implementing RSA and AES cryptographic modules. Since the sensor is only mapped through firmware, this threat is very hard to detect, because data can be exfiltrated without requiring inter-chip communication between victim and attacker. Our results also prove the potential vulnerability in which any untrusted chip on the board can launch such attacks on the remaining system. |
---|---|
AbstractList | The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet extremely difficult to achieve, prerequisite to validate a complete board-level system for safe and secure operation. An increasing risk is that most chips nowadays run software or firmware, typically updated throughout the system lifetime, making it practically impossible to validate the full system at every given point in the manufacturing, integration and operational life cycle. This risk is elevated in devices that run 3rd party firmware. In this paper we show that an FPGA used as a common accelerator in various boards can be reprogrammed by software to introduce a sensor, suitable as a remote power analysis side-channel attack vector at the board-level. We show successful power analysis attacks from one FPGA on the board to another chip implementing RSA and AES cryptographic modules. Since the sensor is only mapped through firmware, this threat is very hard to detect, because data can be exfiltrated without requiring inter-chip communication between victim and attacker. Our results also prove the potential vulnerability in which any untrusted chip on the board can launch such attacks on the remaining system. |
Author | Moradi, Amir Tahoori, Mehdi B. Gnad, Dennis R.E. Schellenberg, Falk |
Author_xml | – sequence: 1 givenname: Falk surname: Schellenberg fullname: Schellenberg, Falk organization: Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany – sequence: 2 givenname: Dennis R.E. surname: Gnad fullname: Gnad, Dennis R.E. organization: Institute of Computer Engineering, Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany – sequence: 3 givenname: Amir surname: Moradi fullname: Moradi, Amir organization: Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany – sequence: 4 givenname: Mehdi B. surname: Tahoori fullname: Tahoori, Mehdi B. organization: Institute of Computer Engineering, Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany |
BookMark | eNotjMtOwzAQRQ0CibZ0zYKNfyDFY49jZxnKq1IkEI915cQTEUidKrZA_XuCYHWke47unJ2EIRBjFyBWAKivlERhcr36pUU4YvNpFUoXWphjNgOtbSZR4RlbxvghhJDWwKRn7OaZdkMivgmJxmz93u350_BNIy-D6w-xi_yl8zQJFwL1vEzJNZ-Ru8SvBzf6rKIv6s_Zaev6SMt_Ltjb3e3r-iGrHu8367LKnESTMpCicB6UNOBNrYzWDUIrCYXAtsEcsPDeOe9bmLK81Vhb4TQIUHldk1QLdvn32xHRdj92OzcetlZbkxulfgB5lUqt |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1145/3240765.3240841 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 1450359507 9781450359504 |
EISSN | 1558-2434 |
EndPage | 7 |
ExternalDocumentID | 8587673 |
Genre | orig-research |
GroupedDBID | 123 6IE 6IF 6IH 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS APO BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO FEDTE IEGSK IJVOP M43 OCL RIE RIL RIO |
ID | FETCH-LOGICAL-a247t-1209ad13271d7b3755c41f2e4004fc46149ddaaddf1ad16f54b80a510136bbe23 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:56:49 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a247t-1209ad13271d7b3755c41f2e4004fc46149ddaaddf1ad16f54b80a510136bbe23 |
PageCount | 7 |
ParticipantIDs | ieee_primary_8587673 |
PublicationCentury | 2000 |
PublicationDate | 2018-Nov. |
PublicationDateYYYYMMDD | 2018-11-01 |
PublicationDate_xml | – month: 11 year: 2018 text: 2018-Nov. |
PublicationDecade | 2010 |
PublicationTitle | 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) |
PublicationTitleAbbrev | ICCAD |
PublicationYear | 2018 |
Publisher | ACM |
Publisher_xml | – name: ACM |
SSID | ssj0002871359 ssj0020286 |
Score | 2.3626447 |
Snippet | The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Field programmable gate arrays Power supplies Side-channel attacks Software Supply chains Voltage measurement |
Title | Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level |
URI | https://ieeexplore.ieee.org/document/8587673 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELbaTrDwaBFveWDEaVK_khEKVYUoqoBK3So7vogKlFYoXfj1-JK0VIiByZblwbJ1_nzn-74j5EqBAOWEY6F1nAkTAouNUShbmXq81tZaDA2MntRwIh6mctog1xsuDACUyWcQYLf8y3eLdIWhsm4sve1q3iRN77hVXK1NPAVf_hyhuXa2_ICqpXwiIbuoO6eVDLCNsfz7Vi2VEkoGe2S0XkSVQfIerAobpF-_9Bn_u8p90vkh7dHxBo4OSAPyQ7K7pTfYJnfP4E8GaBkGZP23-ZKOsUoaXUuT0Je5A4aMgxw-6E1RIAOfmoLeLjC59hEzjDpkMrh_7Q9ZXUaBmZ7QBUN2rHHe69SR05ZrKVMRZT1A681S4fE5cc74ey6L_DSVSWHj0KCtcmUt9PgRaeWLHI4JTSCxNrYgopQLJ4RNZCn4bnTiQqvSE9LG_ZgtK6WMWb0Vp38Pn5Ed__yIK2bfOWkVnyu48BBf2MvybL8BFPqkRw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG4QD-rFBxjf9uDRLizbx-5RUYIKhCgk3Ei7nY1EsxCzXPz1dnZXJMaDpzZND02b6TedzvcNIVcSOEjLLWsaGzCum8BCrSXKVsYOr5UxBkMD_YHsjvnjREwq5HrFhQGAPPkMPOzmf_l2Hi8xVNYIhbNdFWyQTYf7wi_YWquICvr-AYJz-dxyA7IU8_G5aKDynJLCwzbEAvBr1VRyMOnskv73MoockjdvmRkv_vyl0Pjfde6R-g9tjw5XgLRPKpAekJ01xcEauXsGdzZA80Aga7_OFnSIddLotzgJfZlZYMg5SOGd3mQZcvCpzujtHNNre5hjVCfjzv2o3WVlIQWmW1xlDPmx2rp3p_KtMoESIuZ-0gK03yTmDqEja7W76RLfTZOJ4CZsarTWQBoDreCQVNN5CkeERhAZExrgfhxwy7mJRC75rlVkm0bGx6SG-zFdFFoZ03IrTv4eviRb3VG_N-09DJ5OybZzRsKC53dGqtnHEs4d4GfmIj_nL9uWp5A |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2018+IEEE%2FACM+International+Conference+on+Computer-Aided+Design+%28ICCAD%29&rft.atitle=Remote+Inter-Chip+Power+Analysis+Side-Channel+Attacks+at+Board-Level&rft.au=Schellenberg%2C+Falk&rft.au=Gnad%2C+Dennis+R.E.&rft.au=Moradi%2C+Amir&rft.au=Tahoori%2C+Mehdi+B.&rft.date=2018-11-01&rft.pub=ACM&rft.eissn=1558-2434&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1145%2F3240765.3240841&rft.externalDocID=8587673 |