Title | Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Giechaskiel, Ilias, Tian, Shanquan, Szefer, Jakub |
Conference Name | 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |
Date Published | dec |
Keywords | Bandwidth, cloud computing, data centers, Hardware, pubcrawl, Random access memory, resilience, Resiliency, Scalability, Servers, signature based defense, Virtual machining |
Abstract | The availability of FPGAs in cloud data centers offers rapid, on-demand access to hardware compute resources that users can configure to their own needs. However, the low-level access to the hardware FPGA and associated resources such as PCIe, SSD, or DRAM also opens up threats of malicious attackers uploading designs that are able to infer information about other users or about the cloud infrastructure itself. In particular, this work presents a new, fast PCIe-contention-based channel that is able to transmit data between different FPGA-accelerated virtual machines with bandwidths reaching 2 kbps with 97% accuracy. This paper further demonstrates that the PCIe receiver circuits are able to not just receive covert transmissions, but can also perform fine-grained monitoring of the PCIe bus or detect different types of activities from other users' FPGA-accelerated virtual machines based on their PCIe traffic signatures. Beyond leaking information across different virtual machines, the ability to monitor the PCIe bandwidth over hours or days can be used to estimate the data center utilization and map the behavior of the other users. The paper also introduces further novel threats in FPGA-accelerated instances, including contention due to shared NVMe SSDs as well as thermal monitoring to identify FPGA co-location using the DRAM modules attached to the FPGA boards. This is the first work to demonstrate that it is possible to break the separation of privilege in FPGA-accelerated cloud environments, and highlights that defenses for public clouds using FPGAs need to consider PCIe, SSD, and DRAM resources as part of the attack surface that should be protected. |
DOI | 10.1109/HOST49136.2021.9702277 |
Citation Key | giechaskiel_cross-vm_2021 |