A Delay-Based Machine Learning Model for DMA Attack Mitigation

被引:4
|
作者
Gui, Yutian [1 ]
Bhure, Chaitanya [1 ]
Hughes, Marcus [1 ]
Saqib, Fareena [1 ]
机构
[1] Univ North Carolina Charlotte, Elect & Comp Engn, Charlotte, NC 28223 USA
基金
美国国家科学基金会;
关键词
direct memory access; DMA attack; side-channel attack; hardware security; machine learning;
D O I
10.3390/cryptography5030018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access and to efficiently use processing power during data transfers between the main system and a peripheral device. However, this advanced feature opens security vulnerabilities of access compromise and to manipulate the main memory of the victim host machine. The paper outlines a lightweight process that creates resilience against DMA attacks minimal modification to the configuration of the DMA protocol. The proposed scheme performs device identification of the trusted PCIe devices that have DMA capabilities and constructs a database of profiling time to authenticate the trusted devices before they can access the system. The results show that the proposed scheme generates a unique identifier for trusted devices and authenticates the devices. Furthermore, a machine learning-based real-time authentication scheme is proposed that enables runtime authentication and share the results of the time required for training and respective accuracy.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] A delay-based approach for TCP parallelization
    Fu, Q
    Indulska, J
    [J]. 2005 NEXT GENERATION INTERNET NETWORKS, 2005, : 302 - 309
  • [42] A Neuromorphic Model With Delay-Based Reservoir for Continuous Ventricular Heartbeat Detection
    Liang, Xiangpeng
    Li, Haobo
    Vuckovic, Aleksandra
    Mercer, John
    Heidari, Hadi
    [J]. IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2022, 69 (06) : 1837 - 1849
  • [43] Delay-Based Network Utility Maximization
    Neely, Michael J.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (01) : 41 - 54
  • [44] A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices
    Sankepally Sainath Reddy
    Kosaraju Nishoak
    J. L. Shreya
    Yennam Vishwambhar Reddy
    U. Venkanna
    [J]. Journal of Network and Systems Management, 2024, 32
  • [45] Delay-based congestion avoidance for TCP
    Martin, J
    Nilsson, A
    Rhee, I
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2003, 11 (03) : 356 - 369
  • [46] A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices
    Reddy, Sankepally Sainath
    Nishoak, Kosaraju
    Shreya, J. L.
    Reddy, Yennam Vishwambhar
    Venkanna, U.
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (01)
  • [47] The case for delay-based congestion control
    Jin, C
    Wei, DX
    Low, SH
    [J]. CCW 2003: IEEE 18TH ANNUAL WORKSHOP ON COMPUTER COMMUNICATIONS, PROCEEDINGS, 2003, : 99 - 104
  • [48] A delay-based analytical provisioning model for a QoS-enabled service
    Bouras, Christos
    Sevasti, Afrodite
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 766 - 771
  • [49] Delay-Based Network Utility Maximization
    Neely, Michael J.
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [50] Delay-based Cloud Congestion Control
    Gusat, Mitchell
    Birke, Robert
    Minkenberg, Cyriel
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5691 - +