A Delay-Based Machine Learning Model for DMA Attack Mitigation

被引:4
|
作者
Gui, Yutian [1 ]
Bhure, Chaitanya [1 ]
Hughes, Marcus [1 ]
Saqib, Fareena [1 ]
机构
[1] Univ North Carolina Charlotte, Elect & Comp Engn, Charlotte, NC 28223 USA
基金
美国国家科学基金会;
关键词
direct memory access; DMA attack; side-channel attack; hardware security; machine learning;
D O I
10.3390/cryptography5030018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access and to efficiently use processing power during data transfers between the main system and a peripheral device. However, this advanced feature opens security vulnerabilities of access compromise and to manipulate the main memory of the victim host machine. The paper outlines a lightweight process that creates resilience against DMA attacks minimal modification to the configuration of the DMA protocol. The proposed scheme performs device identification of the trusted PCIe devices that have DMA capabilities and constructs a database of profiling time to authenticate the trusted devices before they can access the system. The results show that the proposed scheme generates a unique identifier for trusted devices and authenticates the devices. Furthermore, a machine learning-based real-time authentication scheme is proposed that enables runtime authentication and share the results of the time required for training and respective accuracy.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] A Lightweight Delay-based Authentication Scheme for DMA Attack Mitigation
    Gui, Yutian
    Siddiqui, Ali Shuja
    Nicholas, Geraldine Shirley
    Hughes, Marcus
    Saqib, Fareena
    [J]. PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 263 - 268
  • [2] Design of a Delay-Based FPGA PUF Resistant to Machine Learning Attacks
    Oun, Ahmed
    Niamat, Mohammed
    [J]. 2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 865 - 868
  • [3] MACHINE LEARNING - BASED FRAMEWORK FOR CONSTRUCTION DELAY MITIGATION
    Sanni-Anibire, Muizz O.
    Zin, Rosli M.
    Olatunji, Sunday O.
    [J]. JOURNAL OF INFORMATION TECHNOLOGY IN CONSTRUCTION, 2021, 26 (26): : 303 - 318
  • [4] Towards Attack Resilient Delay-Based Strong PUFs
    Wisiol, Nils
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 5 - 8
  • [5] Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System
    Huang, Rong
    Li, Yuancheng
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (03) : 2367 - 2376
  • [6] A DELAY-BASED MODEL FOR CIRCUIT PARALLELISM
    BAILEY, ML
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 1993, 12 (12) : 1903 - 1912
  • [7] PUFs Physical Learning: Accelerating the Enrollment via Delay-Based Model Extraction
    Aghaie, Anita
    Ender, Maik
    Moradi, Amir
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (03) : 1621 - 1632
  • [8] Delay-based distribution and optimization of a simulation model
    Michel, Clement
    Siron, Pierre
    [J]. PROCEEDINGS OF THE 2018 IEEE/ACM 22ND INTERNATIONAL SYMPOSIUM ON DISTRIBUTED SIMULATION AND REAL TIME APPLICATIONS (DS-RT), 2018, : 21 - 28
  • [9] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Naveen Kumar
    Ashutosh Kumar Singh
    Shashank Srivastava
    [J]. International Journal of Networked and Distributed Computing, 2018, 6 (3) : 174 - 184
  • [10] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Srivastava, Shashank
    [J]. INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2018, 6 (03) : 174 - 184