Title:
Securing FPGA-Accelerated Cloud Infrastructures

dc.contributor.author Szefer, Jakub
dc.contributor.corporatename Georgia Institute of Technology. Institute for Information Security & Privacy en_US
dc.contributor.corporatename Yale Universtiy. School of Engineering and Applied Science en_US
dc.date.accessioned 2020-11-20T14:29:21Z
dc.date.available 2020-11-20T14:29:21Z
dc.date.issued 2020-11-13
dc.description Presented online on November 13, 2020 at 12:00 p.m. en_US
dc.description Jakub Szefer is an Associate Professor of Electrical Engineering & Computer Science at Yale University. His research interests are at the intersection of computer architecture and hardware security. Jakub's recent projects focus on: security verification of processor architectures; hardware (FPGA) implementation of cryptographic algorithms, especially post-quantum cryptographic (PQC) algorithms; designs of new Physically Unclonable Functions (PUFs); and leveraging physical properties of computer hardware for new cryptographic and security applications. en_US
dc.description Runtime: 74:36 minutes en_US
dc.description.abstract Cloud FPGAs have been gaining popularity in recent years due to the ability of users to request FPGA resources quickly, flexibly, and on-demand. However, as public cloud providers make FPGAs available to many, potentially mutually-untrusting users, security of these Cloud FPGA deployments needs to be analyzed, and defenses developed. This talk will discuss Cloud FPGA security from the perspective of side and covert channel attacks. It will cover our recent work on thermal channels that can be used to create covert channels between users renting same FPGA over time. These channels can create stealthy communication medium for leaking small amounts of sensitive information, e.g., cryptographic keys. The talk will also discuss our recent work on voltage-based channels that leverage custom circuits instantiated inside the FPGAs to measure voltage changes. Voltage-based channels can be used to leak sensitive information across FPGAs (in single-tenant or multi-tenant settings), or can be combined with other existing attacks to perform cross-talk leakage inside the FPGAs (in multi-tenant settings). The talk will end with overview of some defenses and open challenges in securing Cloud FPGAs. en_US
dc.format.extent 74:36 minutes
dc.identifier.uri http://hdl.handle.net/1853/63935
dc.language.iso en_US en_US
dc.publisher Georgia Institute of Technology en_US
dc.relation.ispartofseries Cybersecurity Lecture Series
dc.subject Cloud computing en_US
dc.subject Computer security en_US
dc.subject FPGA security en_US
dc.title Securing FPGA-Accelerated Cloud Infrastructures en_US
dc.type Moving Image
dc.type.genre Lecture
dspace.entity.type Publication
local.contributor.corporatename School of Cybersecurity and Privacy
local.contributor.corporatename College of Computing
local.relation.ispartofseries Institute for Information Security & Privacy Cybersecurity Lecture Series
relation.isOrgUnitOfPublication f6d1765b-8d68-42f4-97a7-fe5e2e2aefdf
relation.isOrgUnitOfPublication c8892b3c-8db6-4b7b-a33a-1b67f7db2021
relation.isSeriesOfPublication 2b4a3c7a-f972-4a82-aeaa-818747ae18a7
Files
Original bundle
Now showing 1 - 4 of 4
No Thumbnail Available
Name:
szefer.mp4
Size:
379.3 MB
Format:
MP4 Video file
Description:
Download Video
No Thumbnail Available
Name:
szefer_videostream.html
Size:
1.32 KB
Format:
Hypertext Markup Language
Description:
Streaming Video
No Thumbnail Available
Name:
transcript.txt
Size:
33.96 KB
Format:
Plain Text
Description:
Transcription
Thumbnail Image
Name:
thumbnail.jpg
Size:
62.92 KB
Format:
Joint Photographic Experts Group/JPEG File Interchange Format (JFIF)
Description:
Thumbnail
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
3.13 KB
Format:
Item-specific license agreed upon to submission
Description:
Collections