Filters








21 Hits in 4.0 sec

ThermalBleed: A Practical Thermal Side-Channel Attack

Taehun Kim, Youngjoo Shin
2022 IEEE Access  
Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of covert channels.  ...  To the best of our knowledge, this is the first work that extends a thermal covert channel to a practical side-channel attack by exploring the properties of Intel digital thermal sensors.  ...  This 669 restricted the current research to a simple thermal covert 670 channel, rather than a precise and effective thermal side-671 channel attack.  ... 
doi:10.1109/access.2022.3156596 fatcat:tv6i5fqxnvbzbb7syiapg4f4ja

Energy-Secure System Architectures (ESSA): A Workshop Report

Pradip Bose, Saibal Mukhopadhyay
2019 IEEE Micro  
Another item covered was quick destruction of in-memory data (for DRAMs).  ...  Karpuzcu, "A novel class of covert channels enabled by power budget sharing." A. Krishnan, P. Schaumont, "Hardware support for secure intermittent architectures." I. Tochukwu and A.  ... 
doi:10.1109/mm.2019.2921508 fatcat:l4v772v6p5fwpbg3w2o4itf7dm

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud [article]

Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi
2020 arXiv   pre-print
This is enabled by leveraging the partial reconfiguration property of FPGAs, which allows to split the FPGA fabric into several logically isolated regions and reconfigure the functionality of each region  ...  we survey industrial and academic deployment models of multi-tenant FPGAs in the cloud computing settings, and highlight their different adversary models and security guarantees, while shedding light on  ...  Covert-Channel Attacks Known covert channels on cloud FPGAs can be established based on one of three effects, namely crosstalk effect, power leakage and thermal leakage.  ... 
arXiv:2009.13914v2 fatcat:mbdpjfuoljderjhopoppxkxkoe

Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs

Ilias Giechaskiel, Kasper Rasmussen, Jakub Szefer
2019 2019 IEEE 37th International Conference on Computer Design (ICCD)  
The cross-SLR covert channel is characterized analytically and experimentally on five Xilinx Virtex UltraScale+ FPGAs, both locally and on the Amazon and Huawei clouds.  ...  The power-based channel is shown to have a bandwidth upwards of 4.6 Mbps and accuracy of over 97.6%.  ...  However, these thermal covert channels are slow (< 1 bps). By contrast, voltage-based attacks can have much higher bandwidth compared to thermal channels.  ... 
doi:10.1109/iccd46524.2019.00010 dblp:conf/iccd/GiechaskielRS19 fatcat:iwhajmm6vvhlxjkrpygb3dynnu

A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices [article]

Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos Markantonakis
2022 arXiv   pre-print
In this paper, we comprehensively demonstrate that this design choice exposes practically exploitable side-channels based on frequency-key shifting.  ...  By carefully modulating sensor sampling frequencies in software, we show that unprivileged malicious applications can construct reliable spectral covert channels that bypass existing security mechanisms  ...  bps [44] ), and DRAM channels (411 kbps [43] ).  ... 
arXiv:2110.06363v3 fatcat:eseomdas3baxznm3a76wuj53kq

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis [article]

Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache
2021 arXiv   pre-print
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high-frequency CPUs and complex pipelines.  ...  In this survey, we consolidate recent developments in physical fault injections and side-channel attacks on modern mobile devices.  ...  The use of power, electromagnetic, and thermal side-channels were examined for creating covert channels. Sayakkara et al. [135] (2019) presented a tutorial on using EMA for digital forensics.  ... 
arXiv:2105.04454v5 fatcat:27ldfag7ejgvxh7cbs2qnevb24

2020 Index IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems Vol. 39

2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
., +, TCAD Dec. 2020 4351-4358 Combating Enhanced Thermal Covert Channel in Multi-/Many-Core Systems With Channel-Aware Jamming.  ...  Li, Z., +, TCAD July 2020 1386-1399 Computer network security Combating Enhanced Thermal Covert Channel in Multi-/Many-Core Sys- tems With Channel-Aware Jamming.  ... 
doi:10.1109/tcad.2021.3054536 fatcat:wsw3olpxzbeclenhex3f73qlw4

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

Maria Mushtaq, Muhammad Asim Mukhtar, Vianney Lapotre, Muhammad Khurram Bhatti, Guy Gogniat
2020 Information Systems  
A threat model is presented based on the cache features that are being leveraged for such attacks across cache hierarchy in computing architectures.  ...  The paper also discusses the mitigation and detection techniques proposed against such attacks and classifies them based on their effectiveness at various levels in caching hardware and leveraged features  ...  -L2 levels of cache due to timing variation and self-contention) and multi-core (package-shared state on LLC creating sidechannels and covert-channels) [38] .  ... 
doi:10.1016/j.is.2020.101524 fatcat:odegutokz5hrhmwsznlc7px6qm

IoT Vertical Applications and Associated Security Requirements [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
Side-channel resistance is a recent example; protection from covert and side channels has been a longstanding requirement in the military domain, but not until the appearance of the Spectre and Meltdown  ...  by leveraging the On-Board Diagnostics (e.g., OBD-II).  ... 
doi:10.1007/978-1-4842-2896-8_6 fatcat:eznovqjwwbbn5a4czv3q5cj3cm

pAElla: Edge-AI based Real-Time Malware Detection in Data Centers

Antonio Libri, Andrea Bartolini, Luca Benini
2020 IEEE Internet of Things Journal  
In detail, we report on a novel lightweight and scalable approach to increase the security of DCs/SCs, that involves AI-powered edge computing on high-resolution power consumption.  ...  In this paper, we focus on Data Centers (DCs) and Supercomputers (SCs), where a new generation of high-resolution monitoring systems is being deployed, opening new opportunities for analysis like anomaly  ...  temperature) Derived Metrics erg dram (Energy DRAM consumed) erg pkg (Package Energy consumed) TABLE III FINAL III RESULTS OF THE MD ANALYSIS AND COMPARISON WITH SOA APPROACHESNote.  ... 
doi:10.1109/jiot.2020.2986702 fatcat:i2kmmztnfvdmjfl2ksanpvok6i

MADFAM: MicroArchitectural Data Framework and Methodology

Tor J. Langehaug, Scott R. Graham, Christine M. Schubert Kabban, Brett J. Borghetti
2022 IEEE Access  
The proposed framework focuses on hardware performance counters (HPCs) as the primary data source.  ...  In the case of thermal sensors, logic on the CPU package may prevent exceeding thermal design limits for the CPU whereas an operating system may use thermal sensors to increase system fan speeds as specified  ...  The data collected by hardware sensors can be used to establish covert communication channels or for side channel analysis.  ... 
doi:10.1109/access.2022.3153313 fatcat:2vn75ecwm5clfav3qw3kv2sfoy

Plenary Speaker Harry Y. McSween Jr. to Address Materials Findings of the Mars Pathfinder

1997 MRS bulletin  
and graphics software package for Windows 95 and NT.  ...  We will exhibit the System One Glove Box and gas purification package. Some applications include: solid-state chemistry, inorganic chemistry, synthesis, and crystal mounting for x-ray diffraction.  ...  The DXP-4C is a 4-channel CAMAC module for inexpensively instrumenting multi-element detector arrays. X-Rav Optical System. Inc.  ... 
doi:10.1557/s088376940003428x fatcat:6xiv557yrbesrgdy4vi4c4hxm4

Understanding Security Threats In Cloud

Zhang Xu
2016
Second, we perform a systematical measurement on the public cloud to understand how cloud vendors react to existing security threats.  ...  Finally, we propose a novel technique to perform data reduction on audit data to improve system capacity, and hence helping to enhance security in cloud.  ...  99] and covert channel [89] attacks.  ... 
doi:10.21220/s23w2q fatcat:xkrciizx7netldgnk5eduz7rl4

Dagstuhl Reports, Volume 6, Issue 1, January 2016, Complete Issue [article]

2016
Additional client authentication tends to take place after a one-way authenticated TLS session is established, and the client authenticates inside of the channel via a password or temporary code provided  ...  We know that mass surveillance is happening on medium and large scales.  ...  Broadcast or secure channels may be required. There are many security models, such as semi-honest, covert, malicious. The semi-honest model only guarantees confidentiality, if integrity is preserved.  ... 
doi:10.4230/dagrep.6.1 fatcat:vq74ezrwifbkhex6twvtdzbpaa

Remote Attacks on FPGA Hardware

Dennis Rolf Engelbert Gnad
2020
If no proper communication channel exists, covert channels can be used to transmit this information [126, 138, 139] .  ...  To reduce the thermal influence on our experiments, we keep the FPGA within 38-40°C using the on-board fan.  ...  (c) First order leakage assessment results based on a fixed-vs-random t-test for 1M traces collected during AES encryptions on the STM32L475 IoT Node with the ADC pin connected to V dd . B.3.  ... 
doi:10.5445/ir/1000123237 fatcat:iobn4jcpojgurkqqjckllq3hiu
« Previous Showing results 1 — 15 out of 21 results