Huang, Hengli and Wang, Xiaohang and Jiang, Yingtao and Singh, Amit Kumar and Yang, Mei and Huang, Letian (2022) Detection of and Countermeasure Against Thermal Covert Channel in Many-Core Systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41 (2). pp. 252-265. DOI https://doi.org/10.1109/tcad.2021.3059245
Huang, Hengli and Wang, Xiaohang and Jiang, Yingtao and Singh, Amit Kumar and Yang, Mei and Huang, Letian (2022) Detection of and Countermeasure Against Thermal Covert Channel in Many-Core Systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41 (2). pp. 252-265. DOI https://doi.org/10.1109/tcad.2021.3059245
Huang, Hengli and Wang, Xiaohang and Jiang, Yingtao and Singh, Amit Kumar and Yang, Mei and Huang, Letian (2022) Detection of and Countermeasure Against Thermal Covert Channel in Many-Core Systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41 (2). pp. 252-265. DOI https://doi.org/10.1109/tcad.2021.3059245
Abstract
The thermal covert channels (TCCs) in many-core systems can cause detrimental data breaches. In this article, we present a three-step scheme to detect and fight against such TCC attacks. Specifically, in the detection step, each core calculates the spectrum of its own CPU workload traces that are collected over a few fixed time intervals, and then it applies a frequency scanning method to detect if there exists any TCC attack. In the next positioning step, the logical cores running the transmitter threads are located. In the last step, the physical CPU cores suspiciously engaging in a TCC attack have to undertake dynamic voltage frequency scaling (DVFS) such that any possible TCC trace will be essentially wiped out. Our experiments have confirmed that on average 97% of the TCC attacks can be detected, and with the proposed defense, the packet error rate (PER) of a TCC attack can soar to more than 70%, literally shutting down the attack in practical terms. The performance penalty caused by the inclusion of the proposed DVFS countermeasures is found to be only 3% for an 8×8 many-core system.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Defense against covert channel attack; detection of covert channel; many-core systems; thermal covert channel (TCC) |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 10 Feb 2023 17:28 |
Last Modified: | 16 May 2024 20:43 |
URI: | http://repository.essex.ac.uk/id/eprint/33685 |
Available files
Filename: TCAD.pdf