4.7 Article

Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Cross-VM Covert- and Side-Channel Attacks in Cloud FPGAs

Ilias Giechaskiel et al.

Summary: The availability of FPGAs in cloud data centers provides users with rapid, on-demand access to adaptable hardware compute resources. However, this also exposes vulnerabilities to malicious attacks that can exploit low-level access to the FPGA hardware and associated resources, such as PCIe bus, SSD drives, or DRAM modules, to infer sensitive information.

ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS (2023)

Article Chemistry, Multidisciplinary

DRAM Retention Behavior with Accelerated Aging in Commercial Chips

Md Kawser Bepary et al.

Summary: This study examines the retention behavior of commercial DRAM chips through real-time silicon measurements and investigates how the reliability of DRAM cells degrades with accelerated aging. The research finds that retention errors in DRAM chips increase continuously as they age, and aged retention signatures can be used to differentiate recycled DRAM chips.

APPLIED SCIENCES-BASEL (2022)

Proceedings Paper Computer Science, Hardware & Architecture

An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels

Yuan Liang et al.

Summary: This paper explores the cooling systems of AWS data centers by measuring PVT variations in FPGAs and leveraging the DRAM temperature side channel. It reveals that temperature changes in some data centers are closely related to local weathers, indicating the adoption of free cooling techniques. This study motivates a rethinking of the vulnerability of data centers to power/thermal attacks.

2022 41ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2022) (2022)

Article Computer Science, Hardware & Architecture

A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems

Nico Mexis et al.

Summary: A new generation of the Internet of Things (IoT 2.0) is emerging, based on artificial intelligence, blockchain technology, machine learning, and the consolidation of existing systems. A proof-of-concept prototype of a system of systems was constructed using commercial components and diverse communication protocols, with a lightweight security solution based on hardware and software co-engineering paradigm. The proposed security solution was evaluated for real-time applications and resilience against attacks, confirming its ability to address emerging security challenges.

ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments

Ilias Giechaskiel et al.

Summary: The availability of FPGA in cloud data centers allows rapid access to hardware compute resources, but also poses security threats related to PCIe, SSD, and DRAM resources, potentially leading to information leakage and malicious attacks.

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) (2021)

Proceedings Paper Computer Science, Theory & Methods

Fingerprinting Cloud FPGA Infrastructures

Shanquan Tian et al.

2020 ACM/SIGDA INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE GATE ARRAYS (FPGA '20) (2020)

Article Computer Science, Hardware & Architecture

Decay-Based DRAM PUFs in Commodity Devices

Andre Schaller et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Chemistry, Analytical

Intrinsic Physical Unclonable Function (PUF) Sensors in Commodity Devices

Shuai Chen et al.

SENSORS (2019)

Proceedings Paper Automation & Control Systems

Channel Models for Physical Unclonable Functions based on DRAM Retention Measurements

Sven Mueelich et al.

2019 XVI INTERNATIONAL SYMPOSIUM PROBLEMS OF REDUNDANCY IN INFORMATION AND CONTROL SYSTEMS (REDUNDANCY) (2019)

Proceedings Paper Automation & Control Systems

Spying on Temperature using DRAM

Wenjie Xiong et al.

2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) (2019)

Proceedings Paper Computer Science, Theory & Methods

Vibrational Covert Channels using Low-Frequency Acoustic Signals

Nikolay Matyunin et al.

IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (2019)

Article Computer Science, Hardware & Architecture

SHAIP: Secure Hamming Distance for Authentication of Intrinsic PUFs

Siam Umar Hussain et al.

ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Tracking Private Browsing Sessions using CPU-based Covert Channels

Nikolay Matyunin et al.

WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (2018)

Proceedings Paper Computer Science, Information Systems

Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers

Mohammad A. Islam et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Run-Time Accessible DRAM PUFs in Commodity Devices

Wenjie Xiong et al.

CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016 (2016)

Proceedings Paper Computer Science, Hardware & Architecture

D-PUF: An Intrinsically Reconfigurable DRAM PUF for Device Authentication in Embedded Systems

Soubhagya Sutar et al.

2016 INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURE AND SYNTHESIS FOR EMBEDDED SYSTEMS (CASES) (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Probable Cause: The Deanonymizing Effects of Approximate DRAM

Amir Rahmati et al.

2015 ACM/IEEE 42ND ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA) (2015)

Proceedings Paper Computer Science, Information Systems

PUF-Based Software Protection for Low-End Embedded Devices

Florian Kohnhaeuser et al.

TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015 (2015)

Article Computer Science, Information Systems

Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching

Masoud Rostami et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2014)

Article Engineering, Electrical & Electronic

Field Tolerant Dynamic Intrinsic Chip ID Using 32 nm High-K/Metal Gate SOI Embedded DRAM

Sami Rosenblatt et al.

IEEE JOURNAL OF SOLID-STATE CIRCUITS (2013)

Article Engineering, Electrical & Electronic

A Self-Authenticating Chip Architecture Using an Intrinsic Fingerprint of Embedded DRAM

Sami Rosenblatt et al.

IEEE JOURNAL OF SOLID-STATE CIRCUITS (2013)

Article Engineering, Electrical & Electronic

Physical unclonable functions based on crossbar arrays for cryptographic applications

Paolo Lugli et al.

INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS (2013)

Article Multidisciplinary Sciences

Physical one-way functions

R Pappu et al.

SCIENCE (2002)