Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level

The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet extremely difficult to achieve, prerequisite to validate a complete board-level system for safe and sec...

Full description

Saved in:
Bibliographic Details
Published in2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) pp. 1 - 7
Main Authors Schellenberg, Falk, Gnad, Dennis R.E., Moradi, Amir, Tahoori, Mehdi B.
Format Conference Proceeding
LanguageEnglish
Published ACM 01.11.2018
Subjects
Online AccessGet full text
ISSN1558-2434
DOI10.1145/3240765.3240841

Cover

Loading…
Abstract The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet extremely difficult to achieve, prerequisite to validate a complete board-level system for safe and secure operation. An increasing risk is that most chips nowadays run software or firmware, typically updated throughout the system lifetime, making it practically impossible to validate the full system at every given point in the manufacturing, integration and operational life cycle. This risk is elevated in devices that run 3rd party firmware. In this paper we show that an FPGA used as a common accelerator in various boards can be reprogrammed by software to introduce a sensor, suitable as a remote power analysis side-channel attack vector at the board-level. We show successful power analysis attacks from one FPGA on the board to another chip implementing RSA and AES cryptographic modules. Since the sensor is only mapped through firmware, this threat is very hard to detect, because data can be exfiltrated without requiring inter-chip communication between victim and attacker. Our results also prove the potential vulnerability in which any untrusted chip on the board can launch such attacks on the remaining system.
AbstractList The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet extremely difficult to achieve, prerequisite to validate a complete board-level system for safe and secure operation. An increasing risk is that most chips nowadays run software or firmware, typically updated throughout the system lifetime, making it practically impossible to validate the full system at every given point in the manufacturing, integration and operational life cycle. This risk is elevated in devices that run 3rd party firmware. In this paper we show that an FPGA used as a common accelerator in various boards can be reprogrammed by software to introduce a sensor, suitable as a remote power analysis side-channel attack vector at the board-level. We show successful power analysis attacks from one FPGA on the board to another chip implementing RSA and AES cryptographic modules. Since the sensor is only mapped through firmware, this threat is very hard to detect, because data can be exfiltrated without requiring inter-chip communication between victim and attacker. Our results also prove the potential vulnerability in which any untrusted chip on the board can launch such attacks on the remaining system.
Author Moradi, Amir
Tahoori, Mehdi B.
Gnad, Dennis R.E.
Schellenberg, Falk
Author_xml – sequence: 1
  givenname: Falk
  surname: Schellenberg
  fullname: Schellenberg, Falk
  organization: Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany
– sequence: 2
  givenname: Dennis R.E.
  surname: Gnad
  fullname: Gnad, Dennis R.E.
  organization: Institute of Computer Engineering, Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany
– sequence: 3
  givenname: Amir
  surname: Moradi
  fullname: Moradi, Amir
  organization: Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany
– sequence: 4
  givenname: Mehdi B.
  surname: Tahoori
  fullname: Tahoori, Mehdi B.
  organization: Institute of Computer Engineering, Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany
BookMark eNotjMtOwzAQRQ0CibZ0zYKNfyDFY49jZxnKq1IkEI915cQTEUidKrZA_XuCYHWke47unJ2EIRBjFyBWAKivlERhcr36pUU4YvNpFUoXWphjNgOtbSZR4RlbxvghhJDWwKRn7OaZdkMivgmJxmz93u350_BNIy-D6w-xi_yl8zQJFwL1vEzJNZ-Ru8SvBzf6rKIv6s_Zaev6SMt_Ltjb3e3r-iGrHu8367LKnESTMpCicB6UNOBNrYzWDUIrCYXAtsEcsPDeOe9bmLK81Vhb4TQIUHldk1QLdvn32xHRdj92OzcetlZbkxulfgB5lUqt
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1145/3240765.3240841
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1450359507
9781450359504
EISSN 1558-2434
EndPage 7
ExternalDocumentID 8587673
Genre orig-research
GroupedDBID 123
6IE
6IF
6IH
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
APO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
FEDTE
IEGSK
IJVOP
M43
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-a247t-1209ad13271d7b3755c41f2e4004fc46149ddaaddf1ad16f54b80a510136bbe23
IEDL.DBID RIE
IngestDate Wed Aug 27 02:56:49 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a247t-1209ad13271d7b3755c41f2e4004fc46149ddaaddf1ad16f54b80a510136bbe23
PageCount 7
ParticipantIDs ieee_primary_8587673
PublicationCentury 2000
PublicationDate 2018-Nov.
PublicationDateYYYYMMDD 2018-11-01
PublicationDate_xml – month: 11
  year: 2018
  text: 2018-Nov.
PublicationDecade 2010
PublicationTitle 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
PublicationTitleAbbrev ICCAD
PublicationYear 2018
Publisher ACM
Publisher_xml – name: ACM
SSID ssj0002871359
ssj0020286
Score 2.3626447
Snippet The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Field programmable gate arrays
Power supplies
Side-channel attacks
Software
Supply chains
Voltage measurement
Title Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
URI https://ieeexplore.ieee.org/document/8587673
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELbaTrDwaBFveWDEaVK_khEKVYUoqoBK3So7vogKlFYoXfj1-JK0VIiByZblwbJ1_nzn-74j5EqBAOWEY6F1nAkTAouNUShbmXq81tZaDA2MntRwIh6mctog1xsuDACUyWcQYLf8y3eLdIWhsm4sve1q3iRN77hVXK1NPAVf_hyhuXa2_ICqpXwiIbuoO6eVDLCNsfz7Vi2VEkoGe2S0XkSVQfIerAobpF-_9Bn_u8p90vkh7dHxBo4OSAPyQ7K7pTfYJnfP4E8GaBkGZP23-ZKOsUoaXUuT0Je5A4aMgxw-6E1RIAOfmoLeLjC59hEzjDpkMrh_7Q9ZXUaBmZ7QBUN2rHHe69SR05ZrKVMRZT1A681S4fE5cc74ey6L_DSVSWHj0KCtcmUt9PgRaeWLHI4JTSCxNrYgopQLJ4RNZCn4bnTiQqvSE9LG_ZgtK6WMWb0Vp38Pn5Ed__yIK2bfOWkVnyu48BBf2MvybL8BFPqkRw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG4QD-rFBxjf9uDRLizbx-5RUYIKhCgk3Ei7nY1EsxCzXPz1dnZXJMaDpzZND02b6TedzvcNIVcSOEjLLWsaGzCum8BCrSXKVsYOr5UxBkMD_YHsjvnjREwq5HrFhQGAPPkMPOzmf_l2Hi8xVNYIhbNdFWyQTYf7wi_YWquICvr-AYJz-dxyA7IU8_G5aKDynJLCwzbEAvBr1VRyMOnskv73MoockjdvmRkv_vyl0Pjfde6R-g9tjw5XgLRPKpAekJ01xcEauXsGdzZA80Aga7_OFnSIddLotzgJfZlZYMg5SOGd3mQZcvCpzujtHNNre5hjVCfjzv2o3WVlIQWmW1xlDPmx2rp3p_KtMoESIuZ-0gK03yTmDqEja7W76RLfTZOJ4CZsarTWQBoDreCQVNN5CkeERhAZExrgfhxwy7mJRC75rlVkm0bGx6SG-zFdFFoZ03IrTv4eviRb3VG_N-09DJ5OybZzRsKC53dGqtnHEs4d4GfmIj_nL9uWp5A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2018+IEEE%2FACM+International+Conference+on+Computer-Aided+Design+%28ICCAD%29&rft.atitle=Remote+Inter-Chip+Power+Analysis+Side-Channel+Attacks+at+Board-Level&rft.au=Schellenberg%2C+Falk&rft.au=Gnad%2C+Dennis+R.E.&rft.au=Moradi%2C+Amir&rft.au=Tahoori%2C+Mehdi+B.&rft.date=2018-11-01&rft.pub=ACM&rft.eissn=1558-2434&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1145%2F3240765.3240841&rft.externalDocID=8587673