2021 24th Euromicro Conference on Digital System Design (DSD) 2021
DOI: 10.1109/dsd53832.2021.00060
|View full text |Cite
|
Sign up to set email alerts
|

MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities

Abstract: The increasing complexity of modern microprocessors created new attack areas. Attackers exploit these areas using Software Attacks Targeting Hardware Vulnerabilities (SATHV) such as Cache Side-Channel, Spectre, and Rowhammer attacks. These attacks target the microarchitecture to extract privileged information. As their target is the hardware, antivirus programs cannot detect them. But, they modify the normal behavior of the microarchitecture. Modern systems are equipped with hardware performance counters (HPCs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 14 publications
(28 reference statements)
0
5
0
Order By: Relevance
“…Limited dataset: Botacin et al [4] recently discuss about the use of limited dataset to detect microarchitectural attacks and other kind of malwares with ML algorithms. In order to circumvent this issue, we choose to use evasive attacks based on techniques proposed in [27]. These include the insertion of N OP or sleep instructions in between sensitive tasks to modify the output counts to range closer to normal behavior.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Limited dataset: Botacin et al [4] recently discuss about the use of limited dataset to detect microarchitectural attacks and other kind of malwares with ML algorithms. In order to circumvent this issue, we choose to use evasive attacks based on techniques proposed in [27]. These include the insertion of N OP or sleep instructions in between sensitive tasks to modify the output counts to range closer to normal behavior.…”
Section: Discussionmentioning
confidence: 99%
“…However, LSTMs are resource-intensive MLs, and while a 3.5% performance overhead is not high for server or desktop environments, it can pose limitations when deployed in an IoT device, as resources are limited. Decreasing the frequency of HPC extraction and ML deployment can reduce the overheads, but as shown in [27], in this case the ML algorithms might be vulnerable to evasive attacks, i.e., attacks whose behavior is modified in a way that the extracted HPCs are closer to the normal behavior.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations