Application Inference using Machine Learning based Side Channel Analysis

07/09/2019
by   Nikhil Chawla, et al.
0

The proliferation of ubiquitous computing requires energy-efficient as well as secure operation of modern processors. Side channel attacks are becoming a critical threat to security and privacy of devices embedded in modern computing infrastructures. Unintended information leakage via physical signatures such as power consumption, electromagnetic emission (EM) and execution time have emerged as a key security consideration for SoCs. Also, information published on purpose at user privilege level accessible through software interfaces results in software only attacks. In this paper, we used a supervised learning based approach for inferring applications executing on android platform based on features extracted from EM side-channel emissions and software exposed dynamic voltage frequency scaling(DVFS) states. We highlight the importance of machine learning based approach in utilizing these multi-dimensional features on a complex SoC, against profiling-based approaches. We also show that learning the instantaneous frequency states polled from onboard frequency driver (cpufreq) is adequate to identify a known application and flag potentially malicious unknown application. The experimental results on benchmarking applications running on ARMv8 processor in Snapdragon 820 board demonstrates early detection of these apps, and atleast 85 detecting unknown applications. Overall, the highlight is to utilize a low-complexity path to application inference attacks through learning instantaneous frequency states pattern of CPU core.

READ FULL TEXT

page 1

page 4

page 6

research
06/27/2022

DF-SCA: Dynamic Frequency Side Channel Attacks are Practical

The arm race between hardware security engineers and side-channel resear...
research
05/22/2023

Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs

The drive to create thinner, lighter, and more energy efficient devices ...
research
11/20/2019

PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance

The power consumption of a microprocessor is a huge channel for informat...
research
02/22/2019

DVFS as a Security Failure of TrustZone-enabled Heterogeneous SoC

Today, most embedded systems use Dynamic Voltage and Frequency Scaling (...
research
08/14/2019

Side-Channel Aware Fuzzing

Software testing is becoming a critical part of the development cycle of...
research
02/25/2018

Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator

Modern high-performance as well as power-constrained System-on-Chips (So...
research
06/21/2022

A Practical Methodology for ML-Based EM Side Channel Disassemblers

Providing security guarantees for embedded devices with limited interfac...

Please sign up or login with your details

Forgot password? Click here to reset