2020 57th ACM/IEEE Design Automation Conference (DAC) 2020
DOI: 10.1109/dac18072.2020.9218648
|View full text |Cite
|
Sign up to set email alerts
|

On Countermeasures Against the Thermal Covert Channel Attacks Targeting Many-core Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(34 citation statements)
references
References 9 publications
0
34
0
Order By: Relevance
“…The state-of-the-art countermeasures against TCC attacks proposed in [6], [7], [13] rely on the use of thresholdbased detection approaches to detect the existence of a TCC. Specifically, the threshold-based detection requires scanning of the frequency spectrum, and a TCC attack is deemed to be present if the signal amplitude is higher than the threshold.…”
Section: B Tcc Detection Methods and Coutermeasuresmentioning
confidence: 99%
See 4 more Smart Citations
“…The state-of-the-art countermeasures against TCC attacks proposed in [6], [7], [13] rely on the use of thresholdbased detection approaches to detect the existence of a TCC. Specifically, the threshold-based detection requires scanning of the frequency spectrum, and a TCC attack is deemed to be present if the signal amplitude is higher than the threshold.…”
Section: B Tcc Detection Methods and Coutermeasuresmentioning
confidence: 99%
“…Once a TCC is detected, a jamming noise whose transmission frequency matches the detected TCC is emitted to block the TCC transmission [6]. In [7], DVFS is applied to the cores that have a TCC transceiver to shut down any data transmission right from the source. Another countermeasure approach in [14] tries to separate the identified transmitter and receiver farther apart from each other through task migration.…”
Section: B Tcc Detection Methods and Coutermeasuresmentioning
confidence: 99%
See 3 more Smart Citations