2020
DOI: 10.1109/tcad.2020.3012642
|View full text |Cite
|
Sign up to set email alerts
|

Combating Enhanced Thermal Covert Channel in Multi-/Many-Core Systems With Channel-Aware Jamming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(47 citation statements)
references
References 18 publications
0
47
0
Order By: Relevance
“…For example, before a user application is loaded into its own SGX enclave, the transmitter codes can be injected into the user application as a Trojan [9], resulting in that the transmitter is able to run in the secure zone and has access to private data. After implanted into the secure zone, a TCC program can leak private data by deliberately manipulating chip temperatures [2], [3], [5], [6]. The thermal signals can be obtained either by directly reading the thermal sensors through MSR (i.e., Model Specific Register) software interface [10] or by reading the temperature files exposed by some commonly installed temperature-monitoring utility tool (e.g., CoreTemp [11] in Linux system).…”
Section: Baseline Thermal Covert Channelsmentioning
confidence: 99%
See 3 more Smart Citations
“…For example, before a user application is loaded into its own SGX enclave, the transmitter codes can be injected into the user application as a Trojan [9], resulting in that the transmitter is able to run in the secure zone and has access to private data. After implanted into the secure zone, a TCC program can leak private data by deliberately manipulating chip temperatures [2], [3], [5], [6]. The thermal signals can be obtained either by directly reading the thermal sensors through MSR (i.e., Model Specific Register) software interface [10] or by reading the temperature files exposed by some commonly installed temperature-monitoring utility tool (e.g., CoreTemp [11] in Linux system).…”
Section: Baseline Thermal Covert Channelsmentioning
confidence: 99%
“…Step 2 -Backpropagation: From the output layer to the first layer, the gradient of the cost function to the parameters of each layer is calculated layer by layer by the chain rule following Eqn. (6) to Eqn. (9),…”
Section: Data Preprocessing and Trainingmentioning
confidence: 99%
See 2 more Smart Citations
“…To counter thermal covert channel attacks, recently, a couple of countermeasures [6], [7] have been proposed. In [6], strong noise whose spectrum matches that of the detected thermal covert channel is emitted to jam the data transmission.…”
Section: Introductionmentioning
confidence: 99%