Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms

Thore Tiemann, Zane Weissman, Thomas Eisenbarth, Berk Sunar

Abstract

After years of development, FPGAs finally made an appearance on multi-tenant cloud servers in the late 2010s. Research in micro-architectural attacks has uncovered a variety of vulnerabilities on shared compute devices like CPUs and GPUs which pose a substantial thread to cloud service providers and customers alike, but heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack vectors and vulnerabilities. The FPGAs now available from major cloud services use technologies like direct memory access and coherent caching to offer high-throughput, low-latency, and highly scalable FPGA-FPGA and FPGA-CPU coprocessing for heavy workloads. This chapter explores how FPGAs with access to these microarchitectural features can accelerate attacks against the host memory. It points out cache timing side channels and demonstrates a performant Rowhammer attack against a well-known RSA variant through direct memory access.

Original languageEnglish
Title of host publicationSecurity of FPGA-Accelerated Cloud Computing Environments
Number of pages35
PublisherSpringer International Publishing
Publication date2024
Pages203-237
ISBN (Print)978-3-031-45394-6, 978-3-031-45397-7
ISBN (Electronic)978-3-031-45395-3
DOIs
Publication statusPublished - 2024

Research Areas and Centers

  • Centers: Center for Artificial Intelligence Luebeck (ZKIL)

Fingerprint

Dive into the research topics of 'Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms'. Together they form a unique fingerprint.

Cite this