kth.sePublikationer
Ändra sökning
Länk till posten
Permanent länk

Direktlänk
Publikationer (10 of 14) Visa alla publikationer
Brisfors, M., Moraitis, M., Landin, G. K. & Jilborg, T. (2024). Attacking and Securing the Clock Randomization and DuplicationSide-Channel Attack Countermeasure. In: Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro (Ed.), FPS 2023: Foundations and Practice of Security: . Paper presented at International Symposium on Foundations and Practice of Security, Bordeaux, France 11 December 2023 (pp. 372-387). Berlin, Heidelberg: Springer Nature
Öppna denna publikation i ny flik eller fönster >>Attacking and Securing the Clock Randomization and DuplicationSide-Channel Attack Countermeasure
2024 (Engelska)Ingår i: FPS 2023: Foundations and Practice of Security / [ed] Mohamed Mosbah, Florence Sèdes, Nadia Tawbi, Toufik Ahmed, Nora Boulahia-Cuppens, Joaquin Garcia-Alfaro, Berlin, Heidelberg: Springer Nature , 2024, s. 372-387Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The emergence of deep learning has revolutionized side-channel attacks, making them a serious threat to cryptographic systems. Clock randomization is a well-established mitigation technique against side-channel attacks that, when combined with duplication, has been shown to effectively protect FPGA implementations of block ciphers and post-quantum KEMs. In this paper, we present two deep-learning-based side-channel attacks on an FPGA implementation of AES protected with the clock randomization and duplication countermeasure. The attacks are based on identifying sporadic synchronicity in the execution of the encryption rounds of the two AES cores. We remedy this vulnerability by presenting three modular additions to the original design of the countermeasure that restores its security and increases its robustness.

Ort, förlag, år, upplaga, sidor
Berlin, Heidelberg: Springer Nature, 2024
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:kth:diva-346659 (URN)10.1007/978-3-031-57537-2_23 (DOI)001280331400024 ()2-s2.0-85192564327 (Scopus ID)
Konferens
International Symposium on Foundations and Practice of Security, Bordeaux, France 11 December 2023
Forskningsfinansiär
Vetenskapsrådet, 2020-11632Vinnova, 2023-00221
Anmärkning

QC 20240522

Part of ISBN 978-3-031-57536-5

Tillgänglig från: 2024-05-21 Skapad: 2024-05-21 Senast uppdaterad: 2025-03-24Bibliografiskt granskad
Moraitis, M., Ji, Y., Brisfors, M., Dubrova, E., Lindskog, N. & Englund, H. (2024). Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization. IEEE design & test, 41(5), 7-16
Öppna denna publikation i ny flik eller fönster >>Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization
Visa övriga...
2024 (Engelska)Ingår i: IEEE design & test, ISSN 2168-2356, E-ISSN 2168-2364, Vol. 41, nr 5, s. 7-16Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

CRYSTALS-Kyber has been selected by the NIST as a post-quantum public-key encryption and key establishment algorithm to be standardized. This makes it important to develop side-channel attack resistant implementations of CRYSTALS-Kyber. In this paper, we propose utilizing duplication combined with clock randomization as a means of protecting CRYSTALS-Kyber FPGA implementations from side-channel attacks. Such a countermeasure has been proven effective in ensuring side-channel resistance of AES FPGA implementations. It has the benefits of universal coverage, glitch immunity, and zero clock cycle overhead. We present a protected version of CRYSTALS-Kyber built on the top of the lightweight unprotected implementation by Xing el al. Our security evaluation shows that the protected implementation is resistant to deep learning-based side-channel attacks.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nyckelord
CRYSTALS-Kyber, side-channel attack, countermeasure, clock randomization, duplication, deep learning
Nationell ämneskategori
Teknik och teknologier
Forskningsämne
Elektro- och systemteknik
Identifikatorer
urn:nbn:se:kth:diva-344612 (URN)10.1109/mdat.2023.3298805 (DOI)001302503000004 ()2-s2.0-85165869219 (Scopus ID)
Forskningsfinansiär
Myndigheten för samhällsskydd och beredskap, MSB , 2020-11632Vinnova, 2021-02426Vetenskapsrådet, 2018-04482
Anmärkning

QC 20240321

Tillgänglig från: 2024-03-21 Skapad: 2024-03-21 Senast uppdaterad: 2024-09-10Bibliografiskt granskad
Moraitis, M. (2024). Towards Securing the FPGA Bitstream: Exploiting Vulnerabilities and Implementing Countermeasures. (Doctoral dissertation). Stockholm: KTH Royal Institute of Technology
Öppna denna publikation i ny flik eller fönster >>Towards Securing the FPGA Bitstream: Exploiting Vulnerabilities and Implementing Countermeasures
2024 (Engelska)Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
Abstract [en]

Field-programmable gate arrays (FPGAs) are used across various industries due to their high performance, energy efficiency, and reconfigurability. However, the major advantage of reconfigurability is also a source of security challenges.The present doctoral thesis investigates the security vulnerabilities of the FPGA configuration file, i.e. the bitstream, focusing on the exploration and mitigation of targeted bitstream modification attacks. The results outlined in the seven chapters of the thesis are based on the appended collection of twelve papers. Out of those papers, seven present novel research on the topic of bitstream modification attacks and countermeasures, with the majority of contributions being on attacks. Four present novel research on the topic of FPGA-based countermeasures against side-channel analysis. The final paper presents a survey on bitstream modification attacks and countermeasures. The motivation behind the papers on side-channel countermeasures is to enhance the FPGA encryption schemes, as strong encryption can thwart targeted bitstream modification attacks. 

The attack vector of targeted bitstream modification is explored through a series of attacks against cryptographic FPGA implementations. The targets are popular stream ciphers (SNOW 3G, ACORN, and Trivium) and cryptographic primitives (an arbiter-based physical unclonable function and multi-ring-oscillator-based true random number generator). In the attacks on stream ciphers, the bitstream is modified to introduce faults that weaken the keystream by linearizing its generation process. A subsequent analysis of that faulty keystream reveals the secret key of the implementations. In the attacks on cryptographic primitives, the goal of the bitstream modification attack is to lower the bar or enable a side-channel analysis. The aim of the side-channel analysis is to predict the random output values produced by the primitives. To facilitate that, the bitstream modification attack identifies components in the bitstream that produce exploitable information leakage and creates multiple copies of them. The copies have the same values as the targets, but their outputs are not connected, thus having no impact on the functionality of the design. The study on bitstream modification is complemented with the introduction of low-cost obfuscation countermeasures and a general-purpose methodology against obfuscation based on constants. The methodology is able to defeat all the countermeasures we have previously defined, and its application extends to the general field of hardware design obfuscation.

On the topic of side-channel analysis countermeasures, the popular methodology of clock randomization is evaluated. The assumed side-channel analysis aims to extract the secret key of the advanced encryption standard (AES) block cipher. The evaluation reveales that clock randomization cannot offer protection when the side-channel measurements are sampled at a frequency significantly higher than the operational frequency of the device. In response to that, the clock randomization technique is coupled with encryption core duplication to form, a novel countermeasure called CRCD (clock randomization with encryption core duplication). The countermeasure is shown to effectively protect implementations of block ciphers such as AES, and post-quantum key encapsulation mechanisms such as CRYSTALS-Kyber. Further analysis of the countermeasure reveals a weakness that is exploited and finally patched in an updated implementation of CRCD.

Abstract [sv]

Field-Programmable Gate Arrays (FPGAer) används inom olika branscher på grund av deras höga prestanda, energieffektivitet och omkonfigurerbarhet. Dock är den stora fördelen med omkonfigurerbarhet också en källa till säkerhetsutmaningar.Denna doktorsavhandling undersöker säkerhetsbristerna i FPGA-konfigurationsfilen, d.v.s. bitströmmen, med fokus på utforskning och mildring av riktade bitströmsmodifieringsattacker. Resultaten som redogörs i avhandlingens sju kapitel baseras på en bilagd samling av tolv artiklar. Av dessa artiklar presenterar sju ny forskning om ämnet bitströmsmodifieringsattacker och motåtgärder, med majoriteten av bidragen om attacker. Fyra presenterar ny forskning om ämnet FPGA-baserade motåtgärder mot sidokanalsanalys. Den sista rapporten presenterar en översikt över bitströmsmodifieringsattacker och motåtgärder. Motivationen för rapporterna om sidokanalmotåtgärder är att förbättra FPGA-krypteringsscheman, eftersom stark kryptering kan förhindra riktade bitströmsmodifieringsattacker.

Attackvektorn för riktade bitströmsmodifieringsattacker utforskas genom en serie attacker mot kryptografiska FPGA-implementationer. Målen är populära flödes-chiffer (SNOW 3G, ACORN och Trivium) och kryptografiska primitiv (en arbiter-baserad fysiskt oklonbar funktion och en multi-ring-oscillator-baserad sann slumpmässig nummergenerator). I attackerna på strömkrypteringar modifieras bitströmmen för att introducera fel som försvagar keystreamen genom att linjärisera dess genereringsprocess. En efterföljande analys av den felaktiga keystreamen avslöjar den hemliga nyckeln för implementationerna. I attackerna på kryptografiska primitiv är målet med bitströmsmodi-\\fieringsattacken att sänka ribban eller möjliggöra en sidokanalsanalys. Målet med sidokanalsanalysen är att förutsäga de slumpmässiga utvärdena som produceras av primitiverna. För att underlätta detta identifierar bitströmsmodifieringsattacken komponenter i bitströmmen som producerar utnyttjbar informationsläckage och skapar fler kopior av dem. Kopiorna har samma värden som målen, men deras utgångar är inte anslutna, vilket inte påverkar designens funktionalitet. Studien om bitströmsmodifiering kompletteras med införandet av lågkostnadsförvirringsmotåtgärder och en allmän metodik mot förvirring baserad på konstanter. Metodiken kan besegra alla de motåtgärder vi tidigare definierat, och dess tillämpning sträcker sig till det allmänna området för hårdvarudesignförvirring.

På ämnet motåtgärder mot sidokanalsanalys utvärderas den populära metoden för klockslumpning. Den antagna sidokanalsanalysen syftar till att extrahera den hemliga nyckeln för blockkryptoalgoritmen advanced encryption standard (AES). Utvärderingen visar att klockslumpning inte kan erbjuda skydd när sidokanalsmätningarna samplas med en frekvens som är avsevärt högre än enhetens driftfrekvens. Som svar på detta kombineras tekniken för klockslumpning med duplication av krypteringskärnan för att bilda en ny motåtgärd som kallas CRCD (clock randomization with encryption core duplication). Motåtgärden har visat sig effektivt skydda implementationer av blockkrypteringar som AES och postkvantum nyckelinkapslingsmekanismer som CRYSTALS-Kyber. Ytterligare analys av motåtgärden avslöjar en svaghet som utnyttjas och slutligen åtgärdas i en uppdaterad implementation av CRCD.

Ort, förlag, år, upplaga, sidor
Stockholm: KTH Royal Institute of Technology, 2024. s. xxx, 152
Serie
TRITA-EECS-AVL ; 2024:50
Nyckelord
FPGA, Bitstream, Security, Attack, Cipher, TRNG, PUF, Side-Channel Analysis, Machine Learning, Clock Randomization, FPGA, Bitström, Säkerhet, Attack, Krypto, TRNG, PUF, Sidkanalsanalys, Maskininlärning, Klockslumpning
Nationell ämneskategori
Elektroteknik och elektronik
Forskningsämne
Informations- och kommunikationsteknik
Identifikatorer
urn:nbn:se:kth:diva-346665 (URN)978-91-8040-938-4 (ISBN)
Disputation
2024-06-12, Ka-Sal C (Sven-Olof Öhrvik), Kistagången 16, Kista, 09:00 (Engelska)
Opponent
Handledare
Anmärkning

QC 20240522

Tillgänglig från: 2024-05-22 Skapad: 2024-05-22 Senast uppdaterad: 2024-06-24Bibliografiskt granskad
Moraitis, M., Brisfors, M., Dubrova, E., Lindskog, N. & Englund, H. (2023). A side-channel resistant implementation of AES combining clock randomization with duplication. In: ISCAS 2023: 56th IEEE International Symposium on Circuits and Systems, Proceedings. Paper presented at 56th IEEE International Symposium on Circuits and Systems, ISCAS 2023, Monterey, United States of America, May 21 2023 - May 25 2023. Institute of Electrical and Electronics Engineers (IEEE), 2023-May
Öppna denna publikation i ny flik eller fönster >>A side-channel resistant implementation of AES combining clock randomization with duplication
Visa övriga...
2023 (Engelska)Ingår i: ISCAS 2023: 56th IEEE International Symposium on Circuits and Systems, Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2023, Vol. 2023-MayKonferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Deep learning transformed side-channel analysis and made many conventional countermeasures obsolete. This brings the need for more effective, deep learning-resistant defense mechanisms. We propose a method for protecting hardware implementations of cryptographic algorithms that combines clock randomization with duplication. The presented method ensures that the duplicated block generates algorithmic noise that is dependent on the input of the primary block and has a similar power profile. In addition, the duplicated block does not create any secret key-related leakage. We evaluate the presented method on the example of the Advanced Encryption Standard (AES) algorithm implemented in FPGA. Our experimental results show that the protected AES implementation is resistant to deep learning-based power analysis.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2023
Nyckelord
AES, clock randomization, countermeasure, deep learning, duplication, FPGA, power analysis, Side-channel attack
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:kth:diva-335052 (URN)10.1109/ISCAS46773.2023.10181621 (DOI)001038214601037 ()2-s2.0-85167684103 (Scopus ID)
Konferens
56th IEEE International Symposium on Circuits and Systems, ISCAS 2023, Monterey, United States of America, May 21 2023 - May 25 2023
Anmärkning

Part of ISBN 9781665451093

QC 20230831

Tillgänglig från: 2023-08-31 Skapad: 2023-08-31 Senast uppdaterad: 2024-05-22Bibliografiskt granskad
Brisfors, M., Moraitis, M. & Dubrova, E. (2023). Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES. In: Jourdan, GV Mounier, L Adams, C Sedes, F Garcia-Alfaro, J (Ed.), FPS 2022: Foundations and Practice of Security. Paper presented at 15th International Symposium on Foundations and Practice of Security (FPS), DEC 12-14, 2022, Univ Ottawa, Ottawa, CANADA (pp. 38-53). Springer Nature, 13877
Öppna denna publikation i ny flik eller fönster >>Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES
2023 (Engelska)Ingår i: FPS 2022: Foundations and Practice of Security / [ed] Jourdan, GV Mounier, L Adams, C Sedes, F Garcia-Alfaro, J, Springer Nature , 2023, Vol. 13877, s. 38-53Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Clock randomization is one of the oldest countermeasures against side-channel attacks. Various implementations have been presented in the past, along with positive security evaluations. However, in this paper we show that it is possible to break countermeasures based on a randomized clock by sampling side-channel measurements at a frequency much higher than the encryption clock, synchronizing the traces with pre-processing, and targeting the beginning of the encryption. We demonstrate a deep learning-based side-channel attack on a protected FPGA implementation of AES which can recover a subkey from less than 500 power traces. In contrast to previous attacks on FPGA implementations of AES which targeted the last round, the presented attack uses the first round as the attack point. Any randomized clock countermeasure is significantly weakened by an attack on the first round because the effect of randomness accumulated over multiple encryption rounds is lost.

Ort, förlag, år, upplaga, sidor
Springer Nature, 2023
Serie
Lecture Notes in Computer Science, ISSN 0302-9743
Nyckelord
Side-channel attack, Random Execution Time, Randomized Clock, Countermeasure, Oversampling, Deep Learning, FPGA, AES, Correlation Power Analysis
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:kth:diva-330516 (URN)10.1007/978-3-031-30122-3_3 (DOI)000999884200003 ()2-s2.0-85152529972 (Scopus ID)
Konferens
15th International Symposium on Foundations and Practice of Security (FPS), DEC 12-14, 2022, Univ Ottawa, Ottawa, CANADA
Anmärkning

QC 20230630

Tillgänglig från: 2023-06-30 Skapad: 2023-06-30 Senast uppdaterad: 2024-05-22Bibliografiskt granskad
Moraitis, M. (2023). FPGA Bitstream Modification: Attacks and Countermeasures. IEEE Access, 11, 127931-127955
Öppna denna publikation i ny flik eller fönster >>FPGA Bitstream Modification: Attacks and Countermeasures
2023 (Engelska)Ingår i: IEEE Access, E-ISSN 2169-3536, Vol. 11, s. 127931-127955Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Advances in Field-Programmable Gate Array (FPGA) technology in recent years have resulted in an expansion of its usage in a very wide spectrum of applications. Apart from serving the traditional prototyping purposes, FPGAs are currently regarded as an integral part of embedded systems used in many industries, including communication, medical, aerospace, automotive, and military. Moreover, the emerging trend of AI has found FPGAs to be at the technological forefront with their use as deep learning acceleration platforms. The demand for FPGAs has grown to the point that major companies (e.g. Amazon) are offering cloud-based access to FPGAs, known as FPGA-as-a-Service. In many applications, FPGAs handle sensitive data and/or host cryptographic algorithm implementations. These FPGAs are not always located in a tamper-resistant environment, which makes their security a major concern, especially in light of the ever-growing number of publications demonstrating effective attacks specifically tailored to exploit the physical traits of FPGA implementations. In this survey, we cover the subset of those attacks that involve tampering with the FPGA configuration bitstream. We start by discussing how the FPGA vendors attempt to protect their products and how malicious parties try to overcome this protection. We then proceed to present the different bitstream modification attacks that can be found in the literature organized according to their targets. Finally, we present various countermeasures that can be deployed, drawing on bibliographic references from works specifically focused on FPGA bitstream protection, as well as those initially proposed for different purposes or devices that can be adapted for bitstream protection.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2023
Nyckelord
Field programmable gate arrays, Surveys, Cryptography, Random access memory, Routing, Performance evaluation, Microcontrollers, Physical security, reverse engineering, cryptographic implementation, FPGA, bitstream encryption, bitstream modification
Nationell ämneskategori
Datorsystem
Identifikatorer
urn:nbn:se:kth:diva-341804 (URN)10.1109/ACCESS.2023.3331507 (DOI)001121128200001 ()2-s2.0-85177065681 (Scopus ID)
Anmärkning

QC 20240103

Tillgänglig från: 2024-01-03 Skapad: 2024-01-03 Senast uppdaterad: 2024-05-22Bibliografiskt granskad
Moraitis, M. & Dubrova, E. (2023). FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level. Journal of Hardware and Systems Security, 7(1), 11-24
Öppna denna publikation i ny flik eller fönster >>FPGA Design Deobfuscation by Iterative LUT Modification at Bitstream Level
2023 (Engelska)Ingår i: Journal of Hardware and Systems Security, ISSN 2509-3428, Vol. 7, nr 1, s. 11-24Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Hardware obfuscation is a well-known countermeasure against reverse engineering. For FPGA designs, obfuscation can be implemented with a small overhead by using underutilised logic cells; however, its effectiveness depends on the stealthiness of the added redundancy. In this paper, we show that it is possible to deobfuscate an SRAM FPGA design by ensuring the full controllability of each instantiated look-up table input via iterative bitstream modification. The presented algorithm works directly on bitstream and does not require the possession of a flattened netlist. The feasibility of our approach is verified on the example of an obfuscated SNOW 3G design implemented on a Xilinx 7-series FPGA.

Ort, förlag, år, upplaga, sidor
Springer Nature, 2023
Nyckelord
Obfuscation, Hardware opaque predicate, SRAM FPGA Bitstream modification, Reverse engineering
Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-346662 (URN)10.1007/s41635-022-00130-y (DOI)
Forskningsfinansiär
Vinnova, 2021-02426KTH
Anmärkning

QC 20240522

Tillgänglig från: 2024-05-21 Skapad: 2024-05-21 Senast uppdaterad: 2024-05-22Bibliografiskt granskad
Moraitis, M. & Dubrova, E. (2022). FPGA Design Deobfuscation by Iterative LUT Modifications at Bitstream Level. In: 2022 IEEE European Test Symposium (ETS): . Paper presented at 27th IEEE European Test Symposium (ETS), MAY 23-27, 2022, Barcelona, Spain. IEEE
Öppna denna publikation i ny flik eller fönster >>FPGA Design Deobfuscation by Iterative LUT Modifications at Bitstream Level
2022 (Engelska)Ingår i: 2022 IEEE European Test Symposium (ETS), IEEE, 2022Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

We present an algorithm capable of defeating SRAM FPGA design obfuscation methods based on hardware opaque predicates. This is achieved by ensuring the full controllability of each instantiated look-up table input via iterative bitstream modifications. Unlike many previous deobfuscation approaches, the presented method does not require the possession of a netlist. It is applied directly to the FPGA bitstream. The feasibility of our approach is verified on the example of an obfuscated SNOW 3G design implemented in a Xilinx Artix-7 FPGA.

Ort, förlag, år, upplaga, sidor
IEEE, 2022
Serie
Proceedings of the European Test Symposium, ISSN 1530-1877
Nyckelord
Obfuscation, hardware opaque predicate, SRAM FPGA, bitstream modification, reverse engineering
Nationell ämneskategori
Annan elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-319073 (URN)10.1109/ETS54262.2022.9810466 (DOI)000853268100048 ()2-s2.0-85134244915 (Scopus ID)
Konferens
27th IEEE European Test Symposium (ETS), MAY 23-27, 2022, Barcelona, Spain
Anmärkning

QC 20220926

Part of proceedings: ISBN 978-1-6654-6706-3

Tillgänglig från: 2022-09-26 Skapad: 2022-09-26 Senast uppdaterad: 2022-09-26Bibliografiskt granskad
Yang, Y., Moraitis, M. & Dubrova, E. (2022). Why Deep Learning Makes it Difficult to Keep Secrets in FPGAs. In: DYNAMICS '20: Proceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security: . Paper presented at DYNAMICS 2020: 2020 Workshop in DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security Lexington MA USA 7 December 2020 (pp. 1-9). New YorkNYUnited States, Article ID 8.
Öppna denna publikation i ny flik eller fönster >>Why Deep Learning Makes it Difficult to Keep Secrets in FPGAs
2022 (Engelska)Ingår i: DYNAMICS '20: Proceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security, New YorkNYUnited States, 2022, s. 1-9, artikel-id 8Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

With the growth of popularity of Field-Programmable Gate Arrays (FPGAs) in cloud environments, new paradigms such as FPGA-as-a-Service (FaaS) emerge. This challenges the conventional FPGA security models which assume trust between the user and the hardware owner. In an FaaS scenario, the user may want to keep data or FPGA configuration bitstream confidential in order to protect privacy or intellectual property. However, securing FaaS use cases is hard due to the difficulty of protecting encryption keys and other secrets from the hardware owner. In this paper we demonstrate that even advanced key provisioning and remote attestation methods based on Physical Unclonable Functions (PUFs) can be broken by profiling side-channel attacks employing deep learning. Using power traces from two profiling FPGA boards implementing an arbiter PUF, we train a Convolutional Neural Network (CNN) model to learn features corresponding to “0” and “1” PUF’s responses. Then, we use the resulting model to classify responses of PUFs implemented in FPGA boards under attack (different from the profiling boards). We show that the presented attack can overcome countermeasures based on encrypting challenges and responses of a PUF.

Ort, förlag, år, upplaga, sidor
New YorkNYUnited States: , 2022
Nyckelord
FPGA-as-a-Service, profiling attack, deep learning, side-channel analysis, bitstream modification, arbiter PUF.
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:kth:diva-346658 (URN)10.1145/3477997.3478001 (DOI)2-s2.0-85105193816 (Scopus ID)
Konferens
DYNAMICS 2020: 2020 Workshop in DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security Lexington MA USA 7 December 2020
Forskningsfinansiär
Vetenskapsrådet, 2018-04482
Anmärkning

Part of 978-1-4503-8714-9

QC 20240603

Tillgänglig från: 2024-05-21 Skapad: 2024-05-21 Senast uppdaterad: 2024-07-23Bibliografiskt granskad
Yu, Y., Moraitis, M. & Dubrova, E. (2021). Can Deep Learning Break a True Random Number Generator?. IEEE Transactions on Circuits and Systems - II - Express Briefs, 68(5), 1710-1714
Öppna denna publikation i ny flik eller fönster >>Can Deep Learning Break a True Random Number Generator?
2021 (Engelska)Ingår i: IEEE Transactions on Circuits and Systems - II - Express Briefs, ISSN 1549-7747, E-ISSN 1558-3791, Vol. 68, nr 5, s. 1710-1714Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

True Random Number Generators (TRNGs) create a hardware-based, non-deterministic noise that is used for generating keys, initialization vectors, and nonces in a variety of applications requiring cryptographic protection. A compromised TRNG may lead to a system-wide loss of security. In this brief, we show that an attack combining power analysis with bitstream modification is capable of classifying the output bits of a TRNG implemented in FPGAs from a single power measurement. We demonstrate the attack on the example of an open source AIS-20/31 compliant ring oscillator-based TRNG implemented in Xilinx Artix-7 28nm FPGAs. The combined attack opens a new attack vector which makes possible what is not achievable with pure bitstream modification or side-channel analysis.

Ort, förlag, år, upplaga, sidor
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2021
Nyckelord
Field programmable gate arrays, Entropy, Generators, Training, Side-channel attacks, Deep learning, Power measurement, TRNG, side-channel attack, power analysis, FPGA, bitstream modification
Nationell ämneskategori
Annan elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-296415 (URN)10.1109/TCSII.2021.3066338 (DOI)000645863300031 ()2-s2.0-85103197023 (Scopus ID)
Anmärkning

QC 20210712

Tillgänglig från: 2021-07-12 Skapad: 2021-07-12 Senast uppdaterad: 2024-07-23Bibliografiskt granskad
Organisationer
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-0278-5986

Sök vidare i DiVA

Visa alla publikationer