Denial-of-Service on FPGA-based Cloud Infrastructures — Attack and Defense

نویسندگان

چکیده

This paper presents attacks targeting the FPGAs of AWS F1 instances at electrical level through power-hammering, where excessive dynamic power is used to crash FPGA instances. We demonstrate different power-hammering that pass all security fences implemented on instances, including vendor design rule checks. In addition, we fingerprint observe responsiveness which indicates a successful denial-of-service attack. Most importantly, provide an virus scanner framework, was improved support large datacenter for preventing such attacks, virtually currently demonstrated side-channel attacks. Our experiments showed instance crashes immediately by starting demanding 369W. By using FPGA-fingerprinting, found crashed are unavailable about one over 200 hours.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Denial of Service Attack and Defense

In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve th...

متن کامل

A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment

Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and attackers get the access of core data centers, the availability of the critical resources becomes a big co...

متن کامل

Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order statistics from the observed network traffic records. These second-order statistics extracted by t...

متن کامل

Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack

The Denial-of-service (DoS) attack is considered one of the largest threats to the availability of cloudcomputing services. Due to the unique architecture of cloud-computing systems, the methods for detecting and preventing DoS attacks are quite different from those used in traditional network systems. A main target for DoS attackers is the authentication protocol because it is considered a gat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2021

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2021.i3.441-464