Maya: Falsifying Power Sidechannels with Dynamic Control

作者: Petros Voulgaris , Alexander Schwing , Josep Torrellas , Raghavendra Pradyumna Pothukuchi , Sweta Yamini Pothukuchi

DOI:

关键词:

摘要: The security of computers is at risk because information leaking through physical outputs such as power, temperature, or electromagnetic (EM) emissions. Attackers can use advanced signal measurement and analysis to recover sensitive data from these sidechannels. To address this problem, paper presents Maya, a simple effective solution against power side-channels. idea re-shape the dissipated by an application in application-transparent manner using control theory techniques - preventing attackers learning any information. With theory, controller reliably keep close desired target value even when runtime conditions change unpredictably. Then, changing targets intelligently, be made appear form, appearing carry activity which, reality, unrelated application. Maya implemented privileged software hardware. In paper, we implement on two multiprocessor machines Operating System (OS) threads, show its effectiveness ease deployment.

参考文章(43)
Timo Kasper, David Oswald, Christof Paar, EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment Information Security Applications. pp. 79- 93 ,(2009) , 10.1007/978-3-642-10838-9_7
Robert Callan, Nina Popovic, Angel Daruna, Eric Pollmann, Alenka Zajic, Milos Prvulovic, Comparison of electromagnetic side-channel energy available to the attacker from different computer systems international symposium on electromagnetic compatibility. pp. 219- 223 ,(2015) , 10.1109/ISEMC.2015.7256162
Da-Wei Gu, Petko H. Petkov, Mihail M. Konstantinov, Robust control design with MATLAB ,(2005)
K. Paliwal, A. Agarwal, S. Sinha, A modification over Sakoe and Chiba's dynamic time warping algorithm for isolated word recognition international conference on acoustics, speech, and signal processing. ,vol. 7, pp. 1259- 1261 ,(1982) , 10.1109/ICASSP.1982.1171506
Shengqi Yang, Pallav Gupta, Marilyn Wolf, Dimitrios Serpanos, Vijaykrishnan Narayanan, Yuan Xie, Power Analysis Attack Resistance Engineering by Dynamic Voltage and Frequency Scaling ACM Transactions on Embedded Computing Systems. ,vol. 11, pp. 1- 16 ,(2012) , 10.1145/2345770.2345774
Helmut Hlavacs, Thomas Treutner, Jean-Patrick Gelas, Laurent Lefevre, Anne-Cecile Orgerie, Energy Consumption Side-Channel Attack at Virtual Machines in a Cloud ieee international conference on dependable, autonomic and secure computing. pp. 605- 612 ,(2011) , 10.1109/DASC.2011.110
Zeynep Toprak-Deniz, Michael Sperling, John Bulzacchelli, Gregory Still, Ryan Kruse, Seongwon Kim, David Boerstler, Tilman Gloekler, Raphael Robertazzi, Kevin Stawiasz, Timothy Diemoz, George English, David Hui, Paul Muench, Joshua Friedrich, 5.2 Distributed system of digitally controlled microregulators enabling per-core DVFS for the POWER8 TM microprocessor international solid-state circuits conference. pp. 98- 99 ,(2014) , 10.1109/ISSCC.2014.6757354
Daniel Genkin, Itamar Pipman, Eran Tromer, Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs cryptographic hardware and embedded systems. pp. 242- 260 ,(2014) , 10.1007/978-3-662-44709-3_14
Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, Uday R. Savagaonkar, Innovative instructions and software model for isolated execution hardware and architectural support for security and privacy. pp. 10- ,(2013) , 10.1145/2487726.2488368