Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Datasets and Code
  4. Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs
 
dataset

Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs

Glamocanin, Ognjen  
•
Shrivastava, Shashwat  
•
Yao, Jinwei
Show more
2023
EPFL Infoscience

This repository contains the design files and software required to reproduce the results in the paper "Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs" by Ognjen Glamocanin, Shashwat Shrivastava, Jinwei Yao, Nour Ardo, Mathias Payer, and Mirjana Stojilovic. The paper is accepted for publication in the Springer Journal of Hardware and Systems Security (special issue on Multi-tenant Computing Security Challenges and Solutions).

The README file explains the structure and the contents of the repository, as well as how to use the provided software and data.

Paper abstract: Side-channel disassembly attacks recover CPU instructions from power or electromagnetic side-channel traces measured during code execution. These attacks typically rely on physical access, proximity to the victim device, and high sampling rate measuring instruments. In this work, however, we analyze the CPU instruction-level power side-channel leakage in an environment that lacks physical access or expensive measuring equipment. We show that instruction leakage is present even in a multitenant FPGA scenario, where the victim uses a soft-core CPU, and the adversary deploys on-chip voltage-fluctuation sensors. Unlike previous remote power side-channel attacks, which either require a considerable number of victim traces or attack large victim circuits such as machine learning accelerators, we take an evaluator’s point of view and provide an analysis of the instruction-level power side-channel leakage of a small open-source RISC-V soft processor core. To investigate whether the power side-channel traces leak secrets, we profile the victim device and implement various instruction opcode classifiers based on both classical machine learning algorithms used in disassembly attacks, and novel, deep learning approaches. We explore how parameters such as placement, trace averaging, profiling templates, and different FPGA families (including a cloud-scale FPGA) impact the classification accuracy. Despite the limited leakage of the soft-core CPU victim and a reduced accuracy and sampling rate of on-chip sensors, we show that in a worst-case scenario for the evaluator, i.e., an attacker breaching physical separation, we can identify the opcode of executed instructions with an average accuracy as high as 86.46%. Our analysis shows that determining the executed instruction type is not a classification bottleneck, while leakages between instructions of the same type can be challenging for deep learning models to distinguish. We also show that the instruction-level leakage is significantly reduced in a cloud-scale FPGA scenario with higher soft-core CPU frequencies. Nevertheless, our results show that even small circuits, such as soft-core CPUs, leak potentially exploitable information through on-chip power side channels, and users should deploy mitigation techniques against disassembly attacks to protect their proprietary code and data.

  • Details
  • Metrics
Type
dataset
DOI
10.5281/zenodo.8289077
ACOUA ID

a237fda5-da87-4863-9081-7dee0b920e30

Author(s)
Glamocanin, Ognjen  
Shrivastava, Shashwat  
Yao, Jinwei
Ardo, Nour
Payer, Mathias  
Stojilovic, Mirjana  
Date Issued

2023

Version

1

Publisher

EPFL Infoscience

Subjects

FPGA

•

multitenancy

•

CPU instruction identification

•

power side-channel attack

EPFL units
HEXHIVE  
FunderGrant NO

FNS

Secure FPGAs in the Cloud (200021_182428)

RelationURL/DOI

IsNewVersionOf

https://doi.org/10.5281/zenodo.8289076

IsSupplementTo

https://infoscience.epfl.ch/record/305929

IsCitedBy

https://infoscience.epfl.ch/record/307794
Available on Infoscience
August 28, 2023
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/200321
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés