Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks 2019
DOI: 10.1145/3317549.3319730
|View full text |Cite
|
Sign up to set email alerts
|

Thermal covert channel in bluetooth low energy networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…We analyze the feasibility of the thermal sensor in distinguishing cache access (i.e., cache hit) from physical memory access. In previous studies [8], [11], [12], [28], remnant heat or heat propagation occurring during the execution of a compute-intensive application were exploited to construct a covert channel. However, because of the limited capacity (i.e., resolution and sampling rate), these approaches are impractical for implementing side-channel attacks.…”
Section: B Distinguishing Memory Accessmentioning
confidence: 99%
See 1 more Smart Citation
“…We analyze the feasibility of the thermal sensor in distinguishing cache access (i.e., cache hit) from physical memory access. In previous studies [8], [11], [12], [28], remnant heat or heat propagation occurring during the execution of a compute-intensive application were exploited to construct a covert channel. However, because of the limited capacity (i.e., resolution and sampling rate), these approaches are impractical for implementing side-channel attacks.…”
Section: B Distinguishing Memory Accessmentioning
confidence: 99%
“…[11], [12], [28] explored the observed phenomenon without conducting a thorough analysis of the thermal sensor. This 669 restricted the current research to a simple thermal covert 670 channel, rather than a precise and effective thermal side-671 channel attack.…”
Section: In-depth Analysis Of Thermal Sensorsmentioning
confidence: 99%
“…Therefore, low power consumption can affect the systems' temperatures; • Last, but not least, is easy implementation. Some of the proposed countermeasure methods may need special types of equipment or labs, which may be costly or hard to implement, such as [32,37,52]. However, the proposed countermeasure can easily be employed for any device or system.…”
Section: Referencesmentioning
confidence: 99%