首页> 外文会议>Annual International Symposium on Computer Architecture >FASE: Finding Amplitude-modulated Side-channel Emanations
【24h】

FASE: Finding Amplitude-modulated Side-channel Emanations

机译:Fase:找到幅度调制的侧通道散发

获取原文

摘要

While all computation generates electromagnetic (EM) side-channel signals, some of the strongest and farthest-propagating signals are created when an existing strong periodic signal (e.g. a clock signal) becomes stronger or weaker (amplitude-modulated) depending on processor or memory activity. However, modern systems create emanations at thousands of different frequencies, so it is a difficult, error-prone, and time-consuming task to find those few emanations that are AM-modulated by processor/memory activity. This paper presents a methodology for rapidly finding such activity-modulated signals. This method creates recognizable spectral patterns generated by specially designed micro-benchmarks and then processes the recorded spectra to identify signals that exhibit amplitude-modulation behavior. We apply this method to several computer systems and find several such modulated signals. To illustrate how our methodology can benefit side-channel security research and practice, we also identify the physical mechanisms behind those signals, and find that the strongest signals are created by voltage regulators, memory refreshes, and DRAM clocks. Our results indicate that each signal may carry unique information about system activity, potentially enhancing an attacker's capability to extract sensitive information. We also confirm that our methodology correctly separates emanated signals that are affected by specific processor or memory activities from those that are not.
机译:虽然所有计算产生电磁(EM)侧通道信号,但是当现有的强周期信号(例如时钟信号)变得更强或较弱(幅度调制)取决于处理器或存储器时,将创建一些最强和最远的传播信号活动。然而,现代系统以数千种不同的频率创建散发,因此难以置信,易于出错,耗时的任务,以找到由处理器/内存活动的次数调制的那些少数散发。本文介绍了快速查找此类活动调制信号的方法。该方法创建由专门设计的微基准产生的可识别的频谱模式,然后处理记录的光谱以识别表现出幅度调制行为的信号。我们将此方法应用于几个计算机系统并找到多个这样的调制信号。为了说明我们的方法论如何受益于侧信机的安全研究和实践,我们还确定了这些信号背后的物理机制,并发现最强的信号由电压调节器,存储器刷新和DRAM时钟创建。我们的结果表明,每个信号都可以携带有关系统活动的独特信息,可能提高攻击者提取敏感信息的能力。我们还确认我们的方法可以正确地将受特定处理器或内存活动影响的发出信号分开。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号