Abstract
After years of development, FPGAs finally made an appearance on multi-tenant cloud servers in the late 2010s. Research in micro-architectural attacks has uncovered a variety of vulnerabilities on shared compute devices like CPUs and GPUs which pose a substantial thread to cloud service providers and customers alike, but heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack vectors and vulnerabilities. The FPGAs now available from major cloud services use technologies like direct memory access and coherent caching to offer high-throughput, low-latency, and highly scalable FPGA-FPGA and FPGA-CPU coprocessing for heavy workloads. This chapter explores how FPGAs with access to these microarchitectural features can accelerate attacks against the host memory. It points out cache timing side channels and demonstrates a performant Rowhammer attack against a well-known RSA variant through direct memory access.
Originalsprache | Englisch |
---|---|
Titel | Security of FPGA-Accelerated Cloud Computing Environments |
Seitenumfang | 35 |
Herausgeber (Verlag) | Springer International Publishing |
Erscheinungsdatum | 2024 |
Seiten | 203-237 |
ISBN (Print) | 978-3-031-45394-6, 978-3-031-45397-7 |
ISBN (elektronisch) | 978-3-031-45395-3 |
DOIs | |
Publikationsstatus | Veröffentlicht - 2024 |
Strategische Forschungsbereiche und Zentren
- Zentren: Zentrum für Künstliche Intelligenz Lübeck (ZKIL)