Loading…
Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels
As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, hav...
Saved in:
Published in: | IEEE transactions on computer-aided design of integrated circuits and systems 2024-11, Vol.43 (11), p.3395-3406 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3 |
container_end_page | 3406 |
container_issue | 11 |
container_start_page | 3395 |
container_title | IEEE transactions on computer-aided design of integrated circuits and systems |
container_volume | 43 |
creator | Gonzalez-Gomez, Jeferson Sikal, Mohammed Bakr Khdr, Heba Bauer, Lars Henkel, Jorg |
description | As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, have been recently studied as an effective mechanism to leak information between malicious entities via the modulation of CPU power. To this end, dynamic voltage and frequency scaling (DVFS) has been widely used as a countermeasure to mitigate TCCs by directly affecting the communication between the actors. Although this technique has proven effective in neutralizing such attacks, it introduces significant performance and energy penalties, that are particularly detrimental to energy-constrained embedded systems. In this article, we propose different system-informed countermeasures to power-based covert channels from the heuristic and machine learning (ML) domains. Our proposed techniques leverage task migration and DVFS to jointly mitigate the channels and maximize energy efficiency. Our extensive experimental evaluation on two commercial platforms: 1) the NVIDIA Jetson TX2 and 2) Jetson Orin shows that our approach significantly improves the overall energy efficiency of the system compared to the state-of-the-art solution while nullifying the attack at all times. |
doi_str_mv | 10.1109/TCAD.2024.3438999 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3124825392</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10745832</ieee_id><sourcerecordid>3124825392</sourcerecordid><originalsourceid>FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3</originalsourceid><addsrcrecordid>eNpNkE1LAzEURYMoWKs_QHAx4HpqPicTd-1YtVBRaN0JIZNJakqb1GSqzL93Sl24eot77n1wALhGcIQQFHfLavwwwhDTEaGkFEKcgAEShOcUMXQKBhDzMoeQw3NwkdIaQkQZFgPwMVEb5bXzq2xh9D66tsuUb7KptU4743V3ny261JptPvM2xK1pshfXupVqXfBZsNlb-DExn6jUJ1X4NrHNqk_lvdmkS3Bm1SaZq787BO-P02X1nM9fn2bVeJ5rxIs2r7FVwiKiIa0bxRlhrDCFggXlvOEUCYFKClEpsOU1K7hAxNTaFDVrCBZMkyG4Pe7uYvjam9TKddhH37-UBGFaYkYE7il0pHQMKUVj5S66rYqdRFAeJMqDRHmQKP8k9p2bY8cZY_7xnLKSYPILrLds6A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3124825392</pqid></control><display><type>article</type><title>Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Gonzalez-Gomez, Jeferson ; Sikal, Mohammed Bakr ; Khdr, Heba ; Bauer, Lars ; Henkel, Jorg</creator><creatorcontrib>Gonzalez-Gomez, Jeferson ; Sikal, Mohammed Bakr ; Khdr, Heba ; Bauer, Lars ; Henkel, Jorg</creatorcontrib><description>As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, have been recently studied as an effective mechanism to leak information between malicious entities via the modulation of CPU power. To this end, dynamic voltage and frequency scaling (DVFS) has been widely used as a countermeasure to mitigate TCCs by directly affecting the communication between the actors. Although this technique has proven effective in neutralizing such attacks, it introduces significant performance and energy penalties, that are particularly detrimental to energy-constrained embedded systems. In this article, we propose different system-informed countermeasures to power-based covert channels from the heuristic and machine learning (ML) domains. Our proposed techniques leverage task migration and DVFS to jointly mitigate the channels and maximize energy efficiency. Our extensive experimental evaluation on two commercial platforms: 1) the NVIDIA Jetson TX2 and 2) Jetson Orin shows that our approach significantly improves the overall energy efficiency of the system compared to the state-of-the-art solution while nullifying the attack at all times.</description><identifier>ISSN: 0278-0070</identifier><identifier>EISSN: 1937-4151</identifier><identifier>DOI: 10.1109/TCAD.2024.3438999</identifier><identifier>CODEN: ITCSDI</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Channels ; Commercial aircraft ; Countermeasures ; covert channels ; Design automation ; Embedded systems ; Energy efficiency ; Frequency modulation ; Integrated circuits ; Machine learning ; machine learning (ML) ; Prevention and mitigation ; Security ; security threats ; Voltage</subject><ispartof>IEEE transactions on computer-aided design of integrated circuits and systems, 2024-11, Vol.43 (11), p.3395-3406</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3</cites><orcidid>0000-0001-9788-9026 ; 0000-0003-0253-4594 ; 0000-0002-4200-2632 ; 0000-0003-0245-2062 ; 0000-0001-9602-2922</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10745832$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,54774</link.rule.ids></links><search><creatorcontrib>Gonzalez-Gomez, Jeferson</creatorcontrib><creatorcontrib>Sikal, Mohammed Bakr</creatorcontrib><creatorcontrib>Khdr, Heba</creatorcontrib><creatorcontrib>Bauer, Lars</creatorcontrib><creatorcontrib>Henkel, Jorg</creatorcontrib><title>Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels</title><title>IEEE transactions on computer-aided design of integrated circuits and systems</title><addtitle>TCAD</addtitle><description>As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, have been recently studied as an effective mechanism to leak information between malicious entities via the modulation of CPU power. To this end, dynamic voltage and frequency scaling (DVFS) has been widely used as a countermeasure to mitigate TCCs by directly affecting the communication between the actors. Although this technique has proven effective in neutralizing such attacks, it introduces significant performance and energy penalties, that are particularly detrimental to energy-constrained embedded systems. In this article, we propose different system-informed countermeasures to power-based covert channels from the heuristic and machine learning (ML) domains. Our proposed techniques leverage task migration and DVFS to jointly mitigate the channels and maximize energy efficiency. Our extensive experimental evaluation on two commercial platforms: 1) the NVIDIA Jetson TX2 and 2) Jetson Orin shows that our approach significantly improves the overall energy efficiency of the system compared to the state-of-the-art solution while nullifying the attack at all times.</description><subject>Channels</subject><subject>Commercial aircraft</subject><subject>Countermeasures</subject><subject>covert channels</subject><subject>Design automation</subject><subject>Embedded systems</subject><subject>Energy efficiency</subject><subject>Frequency modulation</subject><subject>Integrated circuits</subject><subject>Machine learning</subject><subject>machine learning (ML)</subject><subject>Prevention and mitigation</subject><subject>Security</subject><subject>security threats</subject><subject>Voltage</subject><issn>0278-0070</issn><issn>1937-4151</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNpNkE1LAzEURYMoWKs_QHAx4HpqPicTd-1YtVBRaN0JIZNJakqb1GSqzL93Sl24eot77n1wALhGcIQQFHfLavwwwhDTEaGkFEKcgAEShOcUMXQKBhDzMoeQw3NwkdIaQkQZFgPwMVEb5bXzq2xh9D66tsuUb7KptU4743V3ny261JptPvM2xK1pshfXupVqXfBZsNlb-DExn6jUJ1X4NrHNqk_lvdmkS3Bm1SaZq787BO-P02X1nM9fn2bVeJ5rxIs2r7FVwiKiIa0bxRlhrDCFggXlvOEUCYFKClEpsOU1K7hAxNTaFDVrCBZMkyG4Pe7uYvjam9TKddhH37-UBGFaYkYE7il0pHQMKUVj5S66rYqdRFAeJMqDRHmQKP8k9p2bY8cZY_7xnLKSYPILrLds6A</recordid><startdate>20241101</startdate><enddate>20241101</enddate><creator>Gonzalez-Gomez, Jeferson</creator><creator>Sikal, Mohammed Bakr</creator><creator>Khdr, Heba</creator><creator>Bauer, Lars</creator><creator>Henkel, Jorg</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-9788-9026</orcidid><orcidid>https://orcid.org/0000-0003-0253-4594</orcidid><orcidid>https://orcid.org/0000-0002-4200-2632</orcidid><orcidid>https://orcid.org/0000-0003-0245-2062</orcidid><orcidid>https://orcid.org/0000-0001-9602-2922</orcidid></search><sort><creationdate>20241101</creationdate><title>Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels</title><author>Gonzalez-Gomez, Jeferson ; Sikal, Mohammed Bakr ; Khdr, Heba ; Bauer, Lars ; Henkel, Jorg</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Channels</topic><topic>Commercial aircraft</topic><topic>Countermeasures</topic><topic>covert channels</topic><topic>Design automation</topic><topic>Embedded systems</topic><topic>Energy efficiency</topic><topic>Frequency modulation</topic><topic>Integrated circuits</topic><topic>Machine learning</topic><topic>machine learning (ML)</topic><topic>Prevention and mitigation</topic><topic>Security</topic><topic>security threats</topic><topic>Voltage</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gonzalez-Gomez, Jeferson</creatorcontrib><creatorcontrib>Sikal, Mohammed Bakr</creatorcontrib><creatorcontrib>Khdr, Heba</creatorcontrib><creatorcontrib>Bauer, Lars</creatorcontrib><creatorcontrib>Henkel, Jorg</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gonzalez-Gomez, Jeferson</au><au>Sikal, Mohammed Bakr</au><au>Khdr, Heba</au><au>Bauer, Lars</au><au>Henkel, Jorg</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels</atitle><jtitle>IEEE transactions on computer-aided design of integrated circuits and systems</jtitle><stitle>TCAD</stitle><date>2024-11-01</date><risdate>2024</risdate><volume>43</volume><issue>11</issue><spage>3395</spage><epage>3406</epage><pages>3395-3406</pages><issn>0278-0070</issn><eissn>1937-4151</eissn><coden>ITCSDI</coden><abstract>As the digital landscape continues to evolve, the security of computing systems has become a critical concern. Power-based covert channels (e.g., thermal covert channel s (TCCs)), a form of communication that exploits the system resources to transmit information in a hidden or unintended manner, have been recently studied as an effective mechanism to leak information between malicious entities via the modulation of CPU power. To this end, dynamic voltage and frequency scaling (DVFS) has been widely used as a countermeasure to mitigate TCCs by directly affecting the communication between the actors. Although this technique has proven effective in neutralizing such attacks, it introduces significant performance and energy penalties, that are particularly detrimental to energy-constrained embedded systems. In this article, we propose different system-informed countermeasures to power-based covert channels from the heuristic and machine learning (ML) domains. Our proposed techniques leverage task migration and DVFS to jointly mitigate the channels and maximize energy efficiency. Our extensive experimental evaluation on two commercial platforms: 1) the NVIDIA Jetson TX2 and 2) Jetson Orin shows that our approach significantly improves the overall energy efficiency of the system compared to the state-of-the-art solution while nullifying the attack at all times.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TCAD.2024.3438999</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0001-9788-9026</orcidid><orcidid>https://orcid.org/0000-0003-0253-4594</orcidid><orcidid>https://orcid.org/0000-0002-4200-2632</orcidid><orcidid>https://orcid.org/0000-0003-0245-2062</orcidid><orcidid>https://orcid.org/0000-0001-9602-2922</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0278-0070 |
ispartof | IEEE transactions on computer-aided design of integrated circuits and systems, 2024-11, Vol.43 (11), p.3395-3406 |
issn | 0278-0070 1937-4151 |
language | eng |
recordid | cdi_proquest_journals_3124825392 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Channels Commercial aircraft Countermeasures covert channels Design automation Embedded systems Energy efficiency Frequency modulation Integrated circuits Machine learning machine learning (ML) Prevention and mitigation Security security threats Voltage |
title | Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T05%3A22%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Balancing%20Security%20and%20Efficiency:%20System-Informed%20Mitigation%20of%20Power-Based%20Covert%20Channels&rft.jtitle=IEEE%20transactions%20on%20computer-aided%20design%20of%20integrated%20circuits%20and%20systems&rft.au=Gonzalez-Gomez,%20Jeferson&rft.date=2024-11-01&rft.volume=43&rft.issue=11&rft.spage=3395&rft.epage=3406&rft.pages=3395-3406&rft.issn=0278-0070&rft.eissn=1937-4151&rft.coden=ITCSDI&rft_id=info:doi/10.1109/TCAD.2024.3438999&rft_dat=%3Cproquest_cross%3E3124825392%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c176t-b2fa9f13c04bda753556e6a06477d7419918401892f7b567913ebce6b5d3295c3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3124825392&rft_id=info:pmid/&rft_ieee_id=10745832&rfr_iscdi=true |