Loading…

Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels

As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, hav...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on computer-aided design of integrated circuits and systems 2024-11, Vol.43 (11), p.3395-3406
Main Authors: Gonzalez-Gomez, Jeferson, Sikal, Mohammed Bakr, Khdr, Heba, Bauer, Lars, Henkel, Jorg
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3
container_end_page 3406
container_issue 11
container_start_page 3395
container_title IEEE transactions on computer-aided design of integrated circuits and systems
container_volume 43
creator Gonzalez-Gomez, Jeferson
Sikal, Mohammed Bakr
Khdr, Heba
Bauer, Lars
Henkel, Jorg
description As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, have been recently studied as an effective mechanism to leak information between malicious entities via the modulation of CPU power. To this end, dynamic voltage and frequency scaling (DVFS) has been widely used as a countermeasure to mitigate TCCs by directly affecting the communication between the actors. Although this technique has proven effective in neutralizing such attacks, it introduces significant performance and energy penalties, that are particularly detrimental to energy-constrained embedded systems. In this article, we propose different system-informed countermeasures to power-based covert channels from the heuristic and machine learning (ML) domains. Our proposed techniques leverage task migration and DVFS to jointly mitigate the channels and maximize energy efficiency. Our extensive experimental evaluation on two commercial platforms: 1) the NVIDIA Jetson TX2 and 2) Jetson Orin shows that our approach significantly improves the overall energy efficiency of the system compared to the state-of-the-art solution while nullifying the attack at all times.
doi_str_mv 10.1109/TCAD.2024.3438999
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3124825392</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10745832</ieee_id><sourcerecordid>3124825392</sourcerecordid><originalsourceid>FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3</originalsourceid><addsrcrecordid>eNpNkE1LAzEURYMoWKs_QHAx4HpqPicTd-1YtVBRaN0JIZNJakqb1GSqzL93Sl24eot77n1wALhGcIQQFHfLavwwwhDTEaGkFEKcgAEShOcUMXQKBhDzMoeQw3NwkdIaQkQZFgPwMVEb5bXzq2xh9D66tsuUb7KptU4743V3ny261JptPvM2xK1pshfXupVqXfBZsNlb-DExn6jUJ1X4NrHNqk_lvdmkS3Bm1SaZq787BO-P02X1nM9fn2bVeJ5rxIs2r7FVwiKiIa0bxRlhrDCFggXlvOEUCYFKClEpsOU1K7hAxNTaFDVrCBZMkyG4Pe7uYvjam9TKddhH37-UBGFaYkYE7il0pHQMKUVj5S66rYqdRFAeJMqDRHmQKP8k9p2bY8cZY_7xnLKSYPILrLds6A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3124825392</pqid></control><display><type>article</type><title>Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Gonzalez-Gomez, Jeferson ; Sikal, Mohammed Bakr ; Khdr, Heba ; Bauer, Lars ; Henkel, Jorg</creator><creatorcontrib>Gonzalez-Gomez, Jeferson ; Sikal, Mohammed Bakr ; Khdr, Heba ; Bauer, Lars ; Henkel, Jorg</creatorcontrib><description>As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, have been recently studied as an effective mechanism to leak information between malicious entities via the modulation of CPU power. To this end, dynamic voltage and frequency scaling (DVFS) has been widely used as a countermeasure to mitigate TCCs by directly affecting the communication between the actors. Although this technique has proven effective in neutralizing such attacks, it introduces significant performance and energy penalties, that are particularly detrimental to energy-constrained embedded systems. In this article, we propose different system-informed countermeasures to power-based covert channels from the heuristic and machine learning (ML) domains. Our proposed techniques leverage task migration and DVFS to jointly mitigate the channels and maximize energy efficiency. Our extensive experimental evaluation on two commercial platforms: 1) the NVIDIA Jetson TX2 and 2) Jetson Orin shows that our approach significantly improves the overall energy efficiency of the system compared to the state-of-the-art solution while nullifying the attack at all times.</description><identifier>ISSN: 0278-0070</identifier><identifier>EISSN: 1937-4151</identifier><identifier>DOI: 10.1109/TCAD.2024.3438999</identifier><identifier>CODEN: ITCSDI</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Channels ; Commercial aircraft ; Countermeasures ; covert channels ; Design automation ; Embedded systems ; Energy efficiency ; Frequency modulation ; Integrated circuits ; Machine learning ; machine learning (ML) ; Prevention and mitigation ; Security ; security threats ; Voltage</subject><ispartof>IEEE transactions on computer-aided design of integrated circuits and systems, 2024-11, Vol.43 (11), p.3395-3406</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3</cites><orcidid>0000-0001-9788-9026 ; 0000-0003-0253-4594 ; 0000-0002-4200-2632 ; 0000-0003-0245-2062 ; 0000-0001-9602-2922</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10745832$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,54774</link.rule.ids></links><search><creatorcontrib>Gonzalez-Gomez, Jeferson</creatorcontrib><creatorcontrib>Sikal, Mohammed Bakr</creatorcontrib><creatorcontrib>Khdr, Heba</creatorcontrib><creatorcontrib>Bauer, Lars</creatorcontrib><creatorcontrib>Henkel, Jorg</creatorcontrib><title>Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels</title><title>IEEE transactions on computer-aided design of integrated circuits and systems</title><addtitle>TCAD</addtitle><description>As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, have been recently studied as an effective mechanism to leak information between malicious entities via the modulation of CPU power. To this end, dynamic voltage and frequency scaling (DVFS) has been widely used as a countermeasure to mitigate TCCs by directly affecting the communication between the actors. Although this technique has proven effective in neutralizing such attacks, it introduces significant performance and energy penalties, that are particularly detrimental to energy-constrained embedded systems. In this article, we propose different system-informed countermeasures to power-based covert channels from the heuristic and machine learning (ML) domains. Our proposed techniques leverage task migration and DVFS to jointly mitigate the channels and maximize energy efficiency. Our extensive experimental evaluation on two commercial platforms: 1) the NVIDIA Jetson TX2 and 2) Jetson Orin shows that our approach significantly improves the overall energy efficiency of the system compared to the state-of-the-art solution while nullifying the attack at all times.</description><subject>Channels</subject><subject>Commercial aircraft</subject><subject>Countermeasures</subject><subject>covert channels</subject><subject>Design automation</subject><subject>Embedded systems</subject><subject>Energy efficiency</subject><subject>Frequency modulation</subject><subject>Integrated circuits</subject><subject>Machine learning</subject><subject>machine learning (ML)</subject><subject>Prevention and mitigation</subject><subject>Security</subject><subject>security threats</subject><subject>Voltage</subject><issn>0278-0070</issn><issn>1937-4151</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNpNkE1LAzEURYMoWKs_QHAx4HpqPicTd-1YtVBRaN0JIZNJakqb1GSqzL93Sl24eot77n1wALhGcIQQFHfLavwwwhDTEaGkFEKcgAEShOcUMXQKBhDzMoeQw3NwkdIaQkQZFgPwMVEb5bXzq2xh9D66tsuUb7KptU4743V3ny261JptPvM2xK1pshfXupVqXfBZsNlb-DExn6jUJ1X4NrHNqk_lvdmkS3Bm1SaZq787BO-P02X1nM9fn2bVeJ5rxIs2r7FVwiKiIa0bxRlhrDCFggXlvOEUCYFKClEpsOU1K7hAxNTaFDVrCBZMkyG4Pe7uYvjam9TKddhH37-UBGFaYkYE7il0pHQMKUVj5S66rYqdRFAeJMqDRHmQKP8k9p2bY8cZY_7xnLKSYPILrLds6A</recordid><startdate>20241101</startdate><enddate>20241101</enddate><creator>Gonzalez-Gomez, Jeferson</creator><creator>Sikal, Mohammed Bakr</creator><creator>Khdr, Heba</creator><creator>Bauer, Lars</creator><creator>Henkel, Jorg</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-9788-9026</orcidid><orcidid>https://orcid.org/0000-0003-0253-4594</orcidid><orcidid>https://orcid.org/0000-0002-4200-2632</orcidid><orcidid>https://orcid.org/0000-0003-0245-2062</orcidid><orcidid>https://orcid.org/0000-0001-9602-2922</orcidid></search><sort><creationdate>20241101</creationdate><title>Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels</title><author>Gonzalez-Gomez, Jeferson ; Sikal, Mohammed Bakr ; Khdr, Heba ; Bauer, Lars ; Henkel, Jorg</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Channels</topic><topic>Commercial aircraft</topic><topic>Countermeasures</topic><topic>covert channels</topic><topic>Design automation</topic><topic>Embedded systems</topic><topic>Energy efficiency</topic><topic>Frequency modulation</topic><topic>Integrated circuits</topic><topic>Machine learning</topic><topic>machine learning (ML)</topic><topic>Prevention and mitigation</topic><topic>Security</topic><topic>security threats</topic><topic>Voltage</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gonzalez-Gomez, Jeferson</creatorcontrib><creatorcontrib>Sikal, Mohammed Bakr</creatorcontrib><creatorcontrib>Khdr, Heba</creatorcontrib><creatorcontrib>Bauer, Lars</creatorcontrib><creatorcontrib>Henkel, Jorg</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gonzalez-Gomez, Jeferson</au><au>Sikal, Mohammed Bakr</au><au>Khdr, Heba</au><au>Bauer, Lars</au><au>Henkel, Jorg</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels</atitle><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle><stitle>TCAD</stitle><date>2024-11-01</date><risdate>2024</risdate><volume>43</volume><issue>11</issue><spage>3395</spage><epage>3406</epage><pages>3395-3406</pages><issn>0278-0070</issn><eissn>1937-4151</eissn><coden>ITCSDI</coden><abstract>As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, have been recently studied as an effective mechanism to leak information between malicious entities via the modulation of CPU power. To this end, dynamic voltage and frequency scaling (DVFS) has been widely used as a countermeasure to mitigate TCCs by directly affecting the communication between the actors. Although this technique has proven effective in neutralizing such attacks, it introduces significant performance and energy penalties, that are particularly detrimental to energy-constrained embedded systems. In this article, we propose different system-informed countermeasures to power-based covert channels from the heuristic and machine learning (ML) domains. Our proposed techniques leverage task migration and DVFS to jointly mitigate the channels and maximize energy efficiency. Our extensive experimental evaluation on two commercial platforms: 1) the NVIDIA Jetson TX2 and 2) Jetson Orin shows that our approach significantly improves the overall energy efficiency of the system compared to the state-of-the-art solution while nullifying the attack at all times.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TCAD.2024.3438999</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-9788-9026</orcidid><orcidid>https://orcid.org/0000-0003-0253-4594</orcidid><orcidid>https://orcid.org/0000-0002-4200-2632</orcidid><orcidid>https://orcid.org/0000-0003-0245-2062</orcidid><orcidid>https://orcid.org/0000-0001-9602-2922</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0278-0070
ispartof IEEE transactions on computer-aided design of integrated circuits and systems, 2024-11, Vol.43 (11), p.3395-3406
issn 0278-0070
1937-4151
language eng
recordid cdi_proquest_journals_3124825392
source IEEE Electronic Library (IEL) Journals
subjects Channels
Commercial aircraft
Countermeasures
covert channels
Design automation
Embedded systems
Energy efficiency
Frequency modulation
Integrated circuits
Machine learning
machine learning (ML)
Prevention and mitigation
Security
security threats
Voltage
title Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T05%3A22%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Balancing%20Security%20and%20Efficiency:%20System-Informed%20Mitigation%20of%20Power-Based%20Covert%20Channels&rft.jtitle=IEEE%20transactions%20on%20computer-aided%20design%20of%20integrated%20circuits%20and%20systems&rft.au=Gonzalez-Gomez,%20Jeferson&rft.date=2024-11-01&rft.volume=43&rft.issue=11&rft.spage=3395&rft.epage=3406&rft.pages=3395-3406&rft.issn=0278-0070&rft.eissn=1937-4151&rft.coden=ITCSDI&rft_id=info:doi/10.1109/TCAD.2024.3438999&rft_dat=%3Cproquest_cross%3E3124825392%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3124825392&rft_id=info:pmid/&rft_ieee_id=10745832&rfr_iscdi=true