BIC: Blind Identification Countermeasure for Malicious Thermal Sensor Attacks in Mobile SoCs

被引:0
|
作者
Abdelrehim, Mostafa [1 ]
Patooghy, Ahmad [2 ]
Malekmohammadi, Amin [1 ]
Badawy, Abdel-Hameed A. [3 ]
机构
[1] Calif State Univ, Bakersfield, CA 93309 USA
[2] North Carolina AT State Univ, Greensboro, NC 27411 USA
[3] New Mexico State Univ, Las Cruces, NM 88003 USA
关键词
MANAGEMENT;
D O I
10.1109/ISQED54688.2022.9806243
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Mobile System-on-Chips (SoCs) heavily rely on dynamic thermal management (DTM) methods in order to deal with their thermal and power density issues at runtime. The efficiency of any DTM method is directly related to the temperature data coming from the thermal sensors. For the first time, in this paper, we introduce a serious security attack on thermal sensors that can alter both the performance and reliability of the chip. We propose a Blind Identification Countermeasure (BIC) that successfully defeats the attack by identifying and isolating the infected sensor. In addition, the proposed method can accurately estimate the steady state temperature of the core associated with the isolated thermal sensor so that the DTM can continue its services with no interruption. Based on our wide range of evaluations, BIC can provide an excellent accuracy of 100% in detecting attacking sensors with a maximum temperature estimation error of approximate to 0.18 degrees C. Also, BIC inflects a negligible performance overhead of 0.7% when tested with Geekbench 43.1 benchmark suite.
引用
收藏
页码:346 / 351
页数:6
相关论文
共 4 条
  • [1] Alternating Blind Identification of Power Sources for Mobile SoCs
    Chetoui, Sofiane
    Chen, Michael
    Golas, Abhinav
    Hijaz, Farrukh
    Belouchrani, Adel
    Reda, Sherief
    PROCEEDINGS OF THE 2022 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE '22), 2022, : 153 - 164
  • [2] Resilient Distributed Localization for Mobile Sensor Networks Under Malicious Attacks
    Lv, Yuan-Wei
    Yang, Guang-Hong
    Dimirovski, Georgi Marko
    SSRN,
  • [3] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [4] Malicious replica quarantining protocol for Mobile Wireless Sensor Networks using replica detection and identification
    Alrashed, Ebrahim A.
    Karaata, Mehmet H.
    Hamdan, Ali A.
    INTERNET OF THINGS, 2024, 27