King's College London

Research portal

Run-Time Protection of Multi-Core Processors from Power-Noise Denial-of-Service Attacks

Research output: Contribution to journalArticle

Standard

Run-Time Protection of Multi-Core Processors from Power-Noise Denial-of-Service Attacks. / Tenentes, Vasileios; Das, Shidhartha; Rossi, Daniele; Al-Hashimi, Bashir M.

In: IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY, Vol. 20, No. 2, 9091594, 06.2020, p. 319-328.

Research output: Contribution to journalArticle

Harvard

Tenentes, V, Das, S, Rossi, D & Al-Hashimi, BM 2020, 'Run-Time Protection of Multi-Core Processors from Power-Noise Denial-of-Service Attacks', IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY, vol. 20, no. 2, 9091594, pp. 319-328. https://doi.org/10.1109/TDMR.2020.2994272

APA

Tenentes, V., Das, S., Rossi, D., & Al-Hashimi, B. M. (2020). Run-Time Protection of Multi-Core Processors from Power-Noise Denial-of-Service Attacks. IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY, 20(2), 319-328. [9091594]. https://doi.org/10.1109/TDMR.2020.2994272

Vancouver

Tenentes V, Das S, Rossi D, Al-Hashimi BM. Run-Time Protection of Multi-Core Processors from Power-Noise Denial-of-Service Attacks. IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY. 2020 Jun;20(2):319-328. 9091594. https://doi.org/10.1109/TDMR.2020.2994272

Author

Tenentes, Vasileios ; Das, Shidhartha ; Rossi, Daniele ; Al-Hashimi, Bashir M. / Run-Time Protection of Multi-Core Processors from Power-Noise Denial-of-Service Attacks. In: IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY. 2020 ; Vol. 20, No. 2. pp. 319-328.

Bibtex Download

@article{10eb79660c744a5998ff1e089512d0cd,
title = "Run-Time Protection of Multi-Core Processors from Power-Noise Denial-of-Service Attacks",
abstract = "In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of-service (DoS) attacks by causing voltage emergencies that may lead to data corruptions and system crashes in multi-core processors. This attack targets processors whose operating voltage has been reduced in-the-field for improving energy efficiency. To protect such undervolted processors from this type of attacks, we present a run-time system for detecting and mitigating power-noise viruses. We present voltage noise data from power-noise viruses and benchmarks collected from an Arm multi-core processor, and we observe that the frequency of voltage emergencies dramatically increases during the execution of power-noise attacks. Based on this observation, we propose a regression model that allows for a run-time estimation of the severity of voltage emergencies by monitoring the frequency of voltage emergencies and the operating frequency of the processor. For mitigating the problem, during the execution of critical tasks requiring protection, our system periodically evaluates the severity of voltage emergencies and adapts the operating frequency of the processor in order to reduce the severity of the attack according to a predefined constraint. We demonstrate the efficiency of the proposed run-time protection system on an actual Arm multi-core processor using two power-noise viruses, and we explore trade-offs between protection latency, CPU utilization and power cost. The proposed software achieves with a very low CPU utilization overhead of less than 0.11% to detect and mitigate power-noise DoS attacks with a latency of 100 μ\mathrm s.",
keywords = "DoS attack, energy-efficiency, PDN, power-noise virus, Security, undervolted microprocessor",
author = "Vasileios Tenentes and Shidhartha Das and Daniele Rossi and Al-Hashimi, {Bashir M.}",
year = "2020",
month = jun,
doi = "10.1109/TDMR.2020.2994272",
language = "English",
volume = "20",
pages = "319--328",
journal = "IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY",
issn = "1530-4388",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

RIS (suitable for import to EndNote) Download

TY - JOUR

T1 - Run-Time Protection of Multi-Core Processors from Power-Noise Denial-of-Service Attacks

AU - Tenentes, Vasileios

AU - Das, Shidhartha

AU - Rossi, Daniele

AU - Al-Hashimi, Bashir M.

PY - 2020/6

Y1 - 2020/6

N2 - In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of-service (DoS) attacks by causing voltage emergencies that may lead to data corruptions and system crashes in multi-core processors. This attack targets processors whose operating voltage has been reduced in-the-field for improving energy efficiency. To protect such undervolted processors from this type of attacks, we present a run-time system for detecting and mitigating power-noise viruses. We present voltage noise data from power-noise viruses and benchmarks collected from an Arm multi-core processor, and we observe that the frequency of voltage emergencies dramatically increases during the execution of power-noise attacks. Based on this observation, we propose a regression model that allows for a run-time estimation of the severity of voltage emergencies by monitoring the frequency of voltage emergencies and the operating frequency of the processor. For mitigating the problem, during the execution of critical tasks requiring protection, our system periodically evaluates the severity of voltage emergencies and adapts the operating frequency of the processor in order to reduce the severity of the attack according to a predefined constraint. We demonstrate the efficiency of the proposed run-time protection system on an actual Arm multi-core processor using two power-noise viruses, and we explore trade-offs between protection latency, CPU utilization and power cost. The proposed software achieves with a very low CPU utilization overhead of less than 0.11% to detect and mitigate power-noise DoS attacks with a latency of 100 μ\mathrm s.

AB - In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of-service (DoS) attacks by causing voltage emergencies that may lead to data corruptions and system crashes in multi-core processors. This attack targets processors whose operating voltage has been reduced in-the-field for improving energy efficiency. To protect such undervolted processors from this type of attacks, we present a run-time system for detecting and mitigating power-noise viruses. We present voltage noise data from power-noise viruses and benchmarks collected from an Arm multi-core processor, and we observe that the frequency of voltage emergencies dramatically increases during the execution of power-noise attacks. Based on this observation, we propose a regression model that allows for a run-time estimation of the severity of voltage emergencies by monitoring the frequency of voltage emergencies and the operating frequency of the processor. For mitigating the problem, during the execution of critical tasks requiring protection, our system periodically evaluates the severity of voltage emergencies and adapts the operating frequency of the processor in order to reduce the severity of the attack according to a predefined constraint. We demonstrate the efficiency of the proposed run-time protection system on an actual Arm multi-core processor using two power-noise viruses, and we explore trade-offs between protection latency, CPU utilization and power cost. The proposed software achieves with a very low CPU utilization overhead of less than 0.11% to detect and mitigate power-noise DoS attacks with a latency of 100 μ\mathrm s.

KW - DoS attack

KW - energy-efficiency

KW - PDN

KW - power-noise virus

KW - Security

KW - undervolted microprocessor

UR - http://www.scopus.com/inward/record.url?scp=85086759860&partnerID=8YFLogxK

U2 - 10.1109/TDMR.2020.2994272

DO - 10.1109/TDMR.2020.2994272

M3 - Article

AN - SCOPUS:85086759860

VL - 20

SP - 319

EP - 328

JO - IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY

JF - IEEE TRANSACTIONS ON DEVICE AND MATERIALS RELIABILITY

SN - 1530-4388

IS - 2

M1 - 9091594

ER -

View graph of relations

© 2020 King's College London | Strand | London WC2R 2LS | England | United Kingdom | Tel +44 (0)20 7836 5454