2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) 2018
DOI: 10.1109/micro.2018.00076
|View full text |Cite
|
Sign up to set email alerts
|

EMPROF: Memory Profiling Via EM-Emanation in IoT and Hand-Held Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…It attracts many researchers' attentions of investigating the system vulnerabilities caused by leaking EMRs. Following this line of researches, EMRs have been exploited to infer victim's keystrokes on keyboards [24], [25], [43], profile device memory usages [44], identify the model of LCD monitors [34], recover the displayed information on mobile screens [35], and exfiltrate secret data by establishing electromagnetic covert channel [45]- [47]. In addition, the most recent studies show that fine-grained data processed on the device also have the leakage threats via EMRs.…”
Section: Related Workmentioning
confidence: 99%
“…It attracts many researchers' attentions of investigating the system vulnerabilities caused by leaking EMRs. Following this line of researches, EMRs have been exploited to infer victim's keystrokes on keyboards [24], [25], [43], profile device memory usages [44], identify the model of LCD monitors [34], recover the displayed information on mobile screens [35], and exfiltrate secret data by establishing electromagnetic covert channel [45]- [47]. In addition, the most recent studies show that fine-grained data processed on the device also have the leakage threats via EMRs.…”
Section: Related Workmentioning
confidence: 99%
“…We consider the following two attack scenarios according to the obtained architectural hints. Table 1 summarizes the available architectural hints and the extracted DNN model types under these two scenarios: 1) Scenario-1 (Side-channel attack): Previous studies show electromagnetic (EM) emanations can easily obtain the offchip events [6] and even perform memory profiling [13]. Therefore, we can obtain the read and write memory access volume (R v , W v ) by EM side-channel attacks.…”
Section: Asplos'20 March 16-20 2020 Lausanne Switzerlandmentioning
confidence: 99%
“…There have been many approaches to resolve or reduce such cache contention, most of these approaches depend on three major components which are: the used benchmark, the classification scheme, the policies, and the used algorithms. The NAS Parallel Benchmarks (NPB) [2], [3], The Standard Performance Evaluation Corporation (SPEC) [4], [5] and Princeton Application Repository for Shared-Memory Computers (PARSEC) [6] are among the popular benchmarking software. Schemes are used for finding the best corunner of an application with another.…”
Section: Introductionmentioning
confidence: 99%