KIT | KIT-Bibliothek | Impressum | Datenschutz

FLARE: Fault Attack Leveraging Address Reconfiguration Exploits in Multi-Tenant FPGAs

Chaudhuri, Jayeeta; Nassar, Hassan ORCID iD icon 1; Gnad, Dennis R. E. 1; Henkel, Jörg 1; Tahoori, Mehdi B. 1; Chakrabarty, Krishnendu
1 Institut für Technische Informatik (ITEC), Karlsruher Institut für Technologie (KIT)

Abstract:

Modern FPGAs are increasingly supporting multi-tenancy to enable dynamic reconfiguration of user modules. While multi-tenant FPGAs improve utilization and flexibility, this paradigm introduces critical security threats. In this paper, we present FLARE, a fault attack that exploits vulnerabilities in the partial reconfiguration process, specifically while a user bitstream is being uploaded to the FPGA by a reconfiguration manager. Unlike traditional fault attacks that operate during module runtime, FLARE injects faults in the bitstream during its reconfiguration, altering the configuration address and redirecting it to unintended partial reconfigurable regions (PRRs). This enables the overwriting of pre-configured co-tenant modules, disrupting their functionality. FLARE leverages power-wasters that activate briefly during the reconfiguration process, making the attack stealthy and more challenging to detect with existing countermeasures. Experimental results on a Xilinx Pynq FPGA demonstrate the effectiveness of FLARE in compromising multiple user bitstreams during the reconfiguration process.


Volltext §
DOI: 10.5445/IR/1000185758
Veröffentlicht am 14.10.2025
Cover der Publikation
Zugehörige Institution(en) am KIT Institut für Technische Informatik (ITEC)
Publikationstyp Forschungsbericht/Preprint
Publikationsjahr 2025
Sprache Englisch
Identifikator KITopen-ID: 1000185758
Vorab online veröffentlicht am 21.02.2025
Nachgewiesen in arXiv
Dimensions
OpenAlex
Relationen in KITopen
KIT – Die Universität in der Helmholtz-Gemeinschaft
KITopen Landing Page