2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC) 2018
DOI: 10.1109/aspdac.2018.8297405
|View full text |Cite
|
Sign up to set email alerts
|

PMU-Trojan: On exploiting power management side channel for information leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…In research, risks posed by side channels are often of interest. For example, CPU power management sensor data have been used to leak Advanced Encryption Standard (AES) keys [19]. If power management sensors are strong enough to leak cryptographic keys, it is reasonable to believe that those same side channels might also be used to create robust application fingerprints.…”
Section: B Hardware Sensorsmentioning
confidence: 99%
“…In research, risks posed by side channels are often of interest. For example, CPU power management sensor data have been used to leak Advanced Encryption Standard (AES) keys [19]. If power management sensors are strong enough to leak cryptographic keys, it is reasonable to believe that those same side channels might also be used to create robust application fingerprints.…”
Section: B Hardware Sensorsmentioning
confidence: 99%
“…E.g., Operating Systems (OS) based on Linux have CPUfreq software, which can set the frequency for each core. This software can be accessed with the kernel privileges to implement the attack [11], [13], [26], [27]. Additionally, the location of the source and sink significantly affects the bandwidth of communication signal due the different level of coupling between cores.…”
Section: Threat Modelmentioning
confidence: 99%
“…The amplitude variation of voltages at various nodes when the information is sent from load R 1 , R 2 , R 3 is shown in Figs. [13][14][15], respectively. It should be noted that the amplitude variation at the source side is not included in these figures because of significantly larger amplitude value as is shown in Figs.…”
Section: Simulation Of Covert Communicationmentioning
confidence: 99%
See 2 more Smart Citations