Shared FPGAs and the Holy Grail: Protections against Side-Channel and Fault Attacks
In this paper, we survey recently proposed methods for protecting against side-channel and fault attacks in shared FPGAs. These methods are quite versatile, targeting FPGA compilation flow, real-time timing-fault detection, on-chip active fences, automated bitstream verification, etc. Despite their versatility, they are mostly designed to counteract a specific class of attacks. To understand how to address the problem of security in shared FPGAs in a comprehensive way, we discuss their individual strengths and weaknesses, in an attempt to identify research directions necessitating further investigation.
Glamocanin21 Shared FPGAs and the Holy Grail (preprint).pdf
Preprint
http://purl.org/coar/version/c_71e4c1898caa6e32
openaccess
CC BY
133.3 KB
Adobe PDF
9039a4bc07356be57f8dc4ddb926197d