Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3133994
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(12 citation statements)
references
References 34 publications
0
12
0
Order By: Relevance
“…Finally, thermal information can also be used as a proxy estimate for power consumption in data centers. This information can alert potential adversaries to opportune moments to attack the availability of servers, either by exceeding the power capacity [21], or by more generally degrading performance [7]. Although these attacks require privileged thermal sensors, FPGA ROs could also be used for similar purposes, complementing our work in this paper.…”
Section: B Power and Temperature Covert Channelsmentioning
confidence: 90%
See 1 more Smart Citation
“…Finally, thermal information can also be used as a proxy estimate for power consumption in data centers. This information can alert potential adversaries to opportune moments to attack the availability of servers, either by exceeding the power capacity [21], or by more generally degrading performance [7]. Although these attacks require privileged thermal sensors, FPGA ROs could also be used for similar purposes, complementing our work in this paper.…”
Section: B Power and Temperature Covert Channelsmentioning
confidence: 90%
“…These differences are summarized in Table VI. Moreover, we return to the default measurement period of 2 t = 2 21 cycles for the Kintex 7 boards, and increase the number of measurements for all boards to 1,500, reducing bandwidth by a factor of 3×. These parameters and the corresponding results are summarized in Table VII.…”
Section: B Gpu Transmissionsmentioning
confidence: 99%
“…Thus, we consider denial-of-service (where the normal world refuses to switch to the secure world) out of scope. Lastly, we consider the following two classes of attacks out of scope as they require specialized solutions-(i) covert or side-channel attacks [6,7,28,30,67] and (ii) physical attacks such as "shoulder surfing" [5] where an attacker peeks at the screen of a user in order to compromise images displayed by the screen.…”
Section: Threat Modelmentioning
confidence: 99%
“…For example, there may be a decrease in activity at certain times in the day, allowing the data center to cool, and the DRAM PUF to result in fewer errors. An attacker might use these insights to reason about data center capacity, and launch attacks on server availability [15,19,20].…”
Section: Monitoring Temperature Changesmentioning
confidence: 99%