A Lightweight Delay-based Authentication Scheme for DMA Attack Mitigation

被引:0
|
作者
Gui, Yutian [1 ]
Siddiqui, Ali Shuja [1 ]
Nicholas, Geraldine Shirley [1 ]
Hughes, Marcus [1 ]
Saqib, Fareena [1 ]
机构
[1] Univ North Carolina Charlotte, Charlotte, NC 28223 USA
关键词
direct memory access; DMA attack; side-channel attack; hardware security;
D O I
10.1109/ISQED51717.2021.9424262
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the extensive application of the Direct Memory Access (DMA) technique, the efficiency of data transfer between the peripheral and the host machine has been improved dramatically. However, these optimizations also introduce security vulnerabilities and expose the process of data transmission to DMA attacks that utilize the feature of direct access to steal the data stored in the live memory on the victim system. In this paper, we propose a lightweight scheme to provide resilience to DMA attacks without physical and protocol-level modification. The proposed scheme constructs a unique identifier for each DMA-supported PCIe device based on profiling time and builds a trusted database for authentication. The experimental result shows that the proposed methodology eliminates most of the noise produced in the measuring process for identifier construction and the success rate of authentication is 100% for all the devices.
引用
收藏
页码:263 / 268
页数:6
相关论文
共 50 条
  • [1] A Delay-Based Machine Learning Model for DMA Attack Mitigation
    Gui, Yutian
    Bhure, Chaitanya
    Hughes, Marcus
    Saqib, Fareena
    [J]. CRYPTOGRAPHY, 2021, 5 (03)
  • [2] A multi-attack resilient lightweight IoT authentication scheme
    Adeel, Adil
    Ali, Mazhar
    Khan, Abdul Nasir
    Khalid, Tauqeer
    Rehman, Faisal
    Jararweh, Yaser
    Shuja, Junaid
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
  • [3] On the Security of the Delay-Based Fingerprint Embedding Scheme
    Lian, Shiguo
    Liu, Zhongxuan
    Dong, Yuan
    Wang, Haila
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 665 - 669
  • [4] A delay-based piggryback scheme in IEEE 802.11
    Lee, Hyun-Jin
    Kim, Jae-Hyun
    Cho, Sung-Hyun
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 447 - +
  • [5] Towards Attack Resilient Delay-Based Strong PUFs
    Wisiol, Nils
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 5 - 8
  • [6] An Adaptive delay-based Power Control and Routing Scheme
    Wang, Ke
    Wong, Wai-Choong
    Chai, Teck Yoong
    [J]. 2013 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2013,
  • [7] A Digital and Lightweight Delay-based Detector against Fault Injection Attacks
    Zhang, Maoshen
    Liu, Qiang
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [8] A passivity enforcement scheme for delay-based transmission line macromodels
    Chinea, Alessandro
    Grivet-Talocia, Stefano
    [J]. IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS, 2007, 17 (08) : 562 - 564
  • [9] Delay-Based RREQ Routing Scheme for Wireless Mesh Network
    Chang, Ching-Lung
    Lin, Tung-Li
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2009, 10 (02): : 103 - 109
  • [10] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Naveen Kumar
    Ashutosh Kumar Singh
    Shashank Srivastava
    [J]. International Journal of Networked and Distributed Computing, 2018, 6 (3) : 174 - 184