Maya: Falsifying Power Sidechannels with Dynamic Control

The security of computers is at risk because of information leaking through physical outputs such as power, temperature, or electromagnetic (EM) emissions. Attackers can use advanced signal measurement and analysis to recover sensitive data from these sidechannels. To address this problem, this paper presents Maya, a simple and effective solution against power side-channels. The idea is to re-shape the power dissipated by an application in an application-transparent manner using control theory techniques - preventing attackers from learning any information. With control theory, a controller can reliably keep power close to a desired target value even when runtime conditions change unpredictably. Then, by changing these targets intelligently, power can be made to appear in any desired form, appearing to carry activity information which, in reality, is unrelated to the application. Maya can be implemented in privileged software or in simple hardware. In this paper, we implement Maya on two multiprocessor machines using Operating System (OS) threads, and show its effectiveness and ease of deployment.

READ FULL TEXT
research
07/22/2019

Maya: Falsifying Power Sidechannels with Operating System Support

The security of computers is at risk because of information leaking thro...
research
12/03/2020

Can I Take Your Subdomain? Exploring Related-Domain Attacks in the Modern Web

Related-domain attackers control a sibling domain of their target web ap...
research
12/30/2022

Power Control for 6G Industrial Wireless Subnetworks: A Graph Neural Network Approach

6th Generation (6G) industrial wireless subnetworks are expected to repl...
research
02/03/2023

Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation

Side-channel attacks that use machine learning (ML) for signal analysis ...
research
08/25/2021

Decoys in Cybersecurity: An Exploratory Study to Test the Effectiveness of 2-sided Deception

One of the widely used cyber deception techniques is decoying, where def...
research
04/10/2023

Helix++: A platform for efficiently securing software

The open-source Helix++ project improves the security posture of computi...
research
03/23/2022

Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion

In this paper, we propose an effective and easily deployable approach to...

Please sign up or login with your details

Forgot password? Click here to reset