Run-time Detection and Mitigation of Power-Noise Viruses

被引:0
|
作者
Tenentes, Vasileios [1 ]
Das, Shidhartha [2 ]
Rossi, Daniele [3 ]
Al-Hashimi, Bashir M. [4 ]
机构
[1] Univ Ioannina, Dept Comp Sci & Engn, Ioannina, Greece
[2] Arm Res, Austin, TX USA
[3] Univ Hertfordshire, Sch Elect & Comp Sci, Hatfield, Herts, England
[4] Univ Southampton, Sch Elect & Comp Sci, Southampton, Hants, England
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”;
关键词
power viruses; security; resonance detection; SYSTEM; MEMORY;
D O I
10.1109/iolts.2019.8854375
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Power-noise viruses can be used as denial-of-service attacks by causing voltage emergencies in multi-core microprocessors that may lead to data corruptions and system crashes. In this paper, we present a run-time system for detecting and mitigating power-noise viruses. We present voltage noise data from a power-noise virus and benchmarks collected from an Arm multi-core processor, and we observe that the frequency of voltage emergencies is dramatically increasing during the execution of power-noise attacks. Based on this observation, we propose a regression model that allows for a run-time estimation of the severity of voltage emergencies by monitoring the frequency of voltage emergencies and the operating frequency of the microprocessor. For mitigating the problem, during the execution of critical tasks that require protection, we propose a system which periodically evaluates the severity of voltage emergencies and adapts its operating frequency in order to honour a predefined severity constraint. We demonstrate the efficacy of the proposed run-time system.
引用
收藏
页码:275 / 280
页数:6
相关论文
共 50 条
  • [21] A Run-Time Power Manager Exploiting Software Parallelism
    Holmbacka, Simon
    Lafond, Sebastien
    Lilius, Johan
    [J]. PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES (PACT'14), 2014, : 471 - 472
  • [22] Model-based run-time error detection
    Hooman, Jozef
    Hendriks, Teun
    [J]. MODELS IN SOFTWARE ENGINEERING, 2008, 5002 : 225 - 236
  • [23] Run-time detection of heap-based overflows
    Robertson, W
    Kruegel, C
    Mutz, D
    Valeur, F
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE SEVENTEENTH LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2003, : 51 - 59
  • [24] RUN-TIME DETECTION OF UNDEFINED VARIABLES CONSIDERED ESSENTIAL
    KEMPTON, W
    WICHMANN, BA
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1990, 20 (04): : 391 - 402
  • [25] Run-time detection and correction of heliostat tracking errors
    Chiesi, Matteo
    Scarselli, Eleonora Franchi
    Guerrieri, Roberto
    [J]. RENEWABLE ENERGY, 2017, 105 : 702 - 711
  • [26] Run-time conflict detection in visual language parsing
    Costagliola, G.
    Deufemia, V
    Ferrucci, F.
    Gravino, C.
    [J]. JOURNAL OF COMPUTER LANGUAGES, 2020, 57
  • [27] Run-time malware detection based on positive selection
    Fuyong Z.
    Deyu Q.
    [J]. Journal in Computer Virology, 2011, 7 (4): : 267 - 277
  • [28] A static analysis method for run-time errors detection
    Cao, WJ
    Xu, SH
    Shi, ZG
    [J]. ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 6615 - 6618
  • [29] Run-time correction
    Grubb, WA
    [J]. OIL & GAS JOURNAL, 2004, 102 (13) : 10 - 10
  • [30] RUN-TIME DEBUGGERS
    NELSON, T
    [J]. DR DOBBS JOURNAL, 1993, 18 (12): : 36 - 36