MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption

05/31/2022
by   Debopriya Roy Dipta, et al.
3

Microarchitectural attacks have become more threatening the hardware security than before with the increasing diversity of attacks such as Spectre and Meltdown. Vendor patches cannot keep up with the pace of the new threats, which makes the dynamic anomaly detection tools more evident than before. Unfortunately, previous studies utilize hardware performance counters that lead to high performance overhead and profile limited number of microarchitectural attacks due to the small number of counters that can be profiled concurrently. This yields those detection tools inefficient in real-world scenarios. In this study, we introduce MAD-EN dynamic detection tool that leverages system-wide energy consumption traces collected from a generic Intel RAPL tool to detect ongoing anomalies in a system. In our experiments, we show that CNN-based MAD-EN can detect 10 different microarchitectural attacks with a total of 15 variants with the highest F1 score of 0.999, which makes our tool the most generic attack detection tool so far. Moreover, individual attacks can be distinguished with a 98 We demonstrate that MAD-EN introduces 69.3 to performance counter-based detection mechanisms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/08/2019

FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning

The growing security threat of microarchitectural attacks underlines the...
research
06/05/2020

Sponge Examples: Energy-Latency Attacks on Neural Networks

The high energy costs of neural network training and inference led to th...
research
05/16/2019

Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection

Advanced attack campaigns span across multiple stages and stay stealthy ...
research
05/01/2023

Correlation-Driven Multi-Level Multimodal Learning for Anomaly Detection on Multiple Energy Sources

Advanced metering infrastructure (AMI) has been widely used as an intell...
research
11/30/2020

Monitoring Performance Metrics is not Enough to Detect Side-Channel Attacks on Intel SGX

Side-channel vulnerabilities of Intel SGX is driving the research commun...
research
04/25/2019

Detecting time-fragmented cache attacks against AES using Performance Monitoring Counters

Cache timing attacks use shared caches in multi-core processors as side ...
research
04/02/2018

Using Unit Testing to Detect Sanitization Flaws

Input sanitization mechanisms are widely used to mitigate vulnerabilitie...

Please sign up or login with your details

Forgot password? Click here to reset