Proceedings of the 33rd Annual ACM Symposium on Applied Computing 2018
DOI: 10.1145/3167132.3167301
|View full text |Cite
|
Sign up to set email alerts
|

The security risks of power measurements in multicores

Abstract: Two of the main goals of power management in modern multicore processors are reducing the average power dissipation and delivering the maximum performance up to the physical limits of the system, when demanded. To achieve these goals, hardware manufacturers and operating system providers include sophisticated power and performance management systems, which require detailed information about the current processor state. For example, Intel processors offer the possibility to measure the power dissipation of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…However, the framework provides two readyto-use models, which can be applied and determine the experimentation flow. The formal models that are implemented and described in ExOT are (i) time-continuous and value-continuous (e. g. thermal [3]), as well as (ii) time-discrete and valuediscrete (e. g. power [10]). One of these two models applies to most covert and side channels.…”
Section: Modellingmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the framework provides two readyto-use models, which can be applied and determine the experimentation flow. The formal models that are implemented and described in ExOT are (i) time-continuous and value-continuous (e. g. thermal [3]), as well as (ii) time-discrete and valuediscrete (e. g. power [10]). One of these two models applies to most covert and side channels.…”
Section: Modellingmentioning
confidence: 99%
“…Hence, capacity bounds are expressive regarding the general threat potential of a data leak, rather than a specific implementation. Examples for capacity bound derivations can be found in related work [3,4,10,12].…”
Section: Capacity Bound Derivationmentioning
confidence: 99%
See 1 more Smart Citation