After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. Heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack vectors and vulnerabilities. In this work, we analyze the memory and cache subsystem and study Rowhammer and cache attacks enabled by two proposed heterogeneous FPGA-CPU platforms from Intel: the Arria 10 GX with an integrated FPGA-CPU platform, and the Arria 10 GX PAC expansion card which connects the FPGA to the CPU via the PCIe interface. We demonstrate JackHammer, a novel, efficient, and stealthy Rowhammer from the FPGA to the host’s main memory. Our results indicate that a malicious FPGA...
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to comm...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Cache attacks are widespread on microprocessors and multi-processor system-on-chips but have not yet...
Over the past decades, the major objectives of computer design have been to improve performance and ...
ABSTRACTFingerprinting SoC FPGA via Measuring Communication LinkOver the past few decades, Field Pro...
Albeit very appealing, FPGA multitenancy in the cloud computing environment is currently on hold due...
Reconfigurable hardware including Field programmable gate arrays (FPGAs) are being used in a wide ra...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits that can be...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to comm...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
A fundamental assumption in software security is that memory contents do not change unless there is ...
Cache attacks are widespread on microprocessors and multi-processor system-on-chips but have not yet...
Over the past decades, the major objectives of computer design have been to improve performance and ...
ABSTRACTFingerprinting SoC FPGA via Measuring Communication LinkOver the past few decades, Field Pro...
Albeit very appealing, FPGA multitenancy in the cloud computing environment is currently on hold due...
Reconfigurable hardware including Field programmable gate arrays (FPGAs) are being used in a wide ra...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Virtualization is no longer limited to main stream processors and servers. Virtualization software f...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits that can be...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
Dark silicon is pushing processor vendors to add more specialized units such as accelerators to comm...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
A fundamental assumption in software security is that memory contents do not change unless there is ...