Shared FPGAs and the Holy Grail: Protections against Side-Channel and Fault Attacks
| Authors |
|
|---|---|
| Publication date | 2021 |
| Book title | 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE 2021) |
| Book subtitle | virtual conference 1-5 February 2021 |
| ISBN |
|
| ISBN (electronic) |
|
| Series | Proceedings, Design, Automation and Test in Europe |
| Event | 2021 Design, Automation & Test in Europe Conference & Exhibition |
| Pages (from-to) | 1645-1650 |
| Number of pages | 6 |
| Publisher | Piscataway, NJ: IEEE |
| Organisations |
|
| Abstract |
In this paper, we survey recently proposed methods for protecting against side-channel and fault attacks in shared FPGAs. These methods are quite versatile, targeting FPGA compilation flow, real-time timing-fault detection, on-chip active fences, automated bitstream verification, etc. Despite their versatility, they are mostly designed to counteract a specific class of attacks. To understand how to address the problem of security in shared FPGAs in a comprehensive way, we discuss their individual strengths and weaknesses, in an attempt to identify research directions necessitating further investigation.
|
| Document type | Conference contribution |
| Language | English |
| Published at | https://doi.org/10.23919/DATE51398.2021.9473947 |
| Permalink to this page | |