Run-time Detection and Mitigation of Power-Noise Viruses

被引:0
|
作者
Tenentes, Vasileios [1 ]
Das, Shidhartha [2 ]
Rossi, Daniele [3 ]
Al-Hashimi, Bashir M. [4 ]
机构
[1] Univ Ioannina, Dept Comp Sci & Engn, Ioannina, Greece
[2] Arm Res, Austin, TX USA
[3] Univ Hertfordshire, Sch Elect & Comp Sci, Hatfield, Herts, England
[4] Univ Southampton, Sch Elect & Comp Sci, Southampton, Hants, England
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”;
关键词
power viruses; security; resonance detection; SYSTEM; MEMORY;
D O I
10.1109/iolts.2019.8854375
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Power-noise viruses can be used as denial-of-service attacks by causing voltage emergencies in multi-core microprocessors that may lead to data corruptions and system crashes. In this paper, we present a run-time system for detecting and mitigating power-noise viruses. We present voltage noise data from a power-noise virus and benchmarks collected from an Arm multi-core processor, and we observe that the frequency of voltage emergencies is dramatically increasing during the execution of power-noise attacks. Based on this observation, we propose a regression model that allows for a run-time estimation of the severity of voltage emergencies by monitoring the frequency of voltage emergencies and the operating frequency of the microprocessor. For mitigating the problem, during the execution of critical tasks that require protection, we propose a system which periodically evaluates the severity of voltage emergencies and adapts its operating frequency in order to honour a predefined severity constraint. We demonstrate the efficacy of the proposed run-time system.
引用
收藏
页码:275 / 280
页数:6
相关论文
共 50 条
  • [1] Run-Time Protection of Multi-Core Processors From Power-Noise Denial-of-Service Attacks
    Tenentes, Vasileios
    Das, Shidhartha
    Rossi, Daniele
    Al-Hashimi, Bashir M.
    [J]. IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY, 2020, 20 (02) : 319 - 328
  • [2] Integrated Microarchitectural Floorplanning and Run-time Controller for Inductive Noise Mitigation
    Healy, Michael B.
    Mohamood, Fayez
    Lee, Hsien-Hsin S.
    Lim, Sung Kyu
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2011, 16 (04)
  • [3] A survey on run-time packers and mitigation techniques
    Alkhateeb, Ehab
    Ghorbani, Ali
    Lashkari, Arash Habibi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 887 - 913
  • [4] A survey on run-time packers and mitigation techniques
    Ehab Alkhateeb
    Ali Ghorbani
    Arash Habibi Lashkari
    [J]. International Journal of Information Security, 2024, 23 : 887 - 913
  • [5] THE POWER MACS RUN-TIME ARCHITECTURE
    THELEN, R
    [J]. BYTE, 1994, 19 (04): : 131 - &
  • [6] Approximation for Run-time Power Management
    Kanduri, Anil
    Haghbayan, Mohammad-Hashem
    Rahmani, Amir M.
    Liljeberg, Pasi
    [J]. 2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [7] The Importance of Run-Time Error Detection
    Luecke, Glenn R.
    Coyle, James
    Hoekstra, James
    Kraeva, Marina
    Xu, Ying
    Park, Mi-Young
    Kleiman, Elizabeth
    Weiss, Olga
    Wehe, Andre
    Yahya, Melissa
    [J]. TOOLS FOR HIGH PERFORMANCE COMPUTING 2009, 2010, : 145 - 155
  • [8] Run-time detection of covert channels
    Nagatou, Naoyuki
    Watanabe, Takuo
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 577 - +
  • [9] Raindroid - A System for Run-time Mitigation of Android Intent Vulnerabilities
    Schmerl, Bradley
    Gennari, Jeffrey
    Camara, Javier
    Garlan, David
    [J]. SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 115 - 117
  • [10] A Survey on Run-time Power Monitors at the Edge
    Zoni, Davide
    Galimberti, Andrea
    Fornaciari, William
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (14S)