TY - JOUR
T1 - Maya
T2 - Using Formal Control to Obfuscate Power Side Channels
AU - Pothukuchi, Raghavendra Pradyumna
AU - Pothukuchi, Sweta Yamini
AU - Voulgaris, Petros G.
AU - Schwing, Alexander
AU - Torrellas, Josep
N1 - Publisher Copyright:
© 1981-2012 IEEE.
PY - 2022
Y1 - 2022
N2 - The security of computers is at risk because of information leaking through their power consumption. Attackers can use advanced signal measurement and analysis to recover sensitive data from this side channel. To address this problem, this article presents Maya, a simple and effective defense against power side channels. The idea is to use formal control to re-shape the power dissipated by a computer in an application-transparent mannerâ€Â"preventing attackers from learning any information about the applications that are running. With formal control, a controller can reliably keep power consumption close to a desired target function even when runtime conditions change unpredictably. By selecting the target function intelligently, the controller can make power to follow any desired shape, appearing to carry activity information which, in reality, is unrelated to the application. Maya can be implemented in privileged software, firmware and hardware. We implement Maya on three machines using only privileged threads against machine learning based attacks, and show its effectiveness and ease of deployment. Maya has already thwarted a newly developed remote power attack.
AB - The security of computers is at risk because of information leaking through their power consumption. Attackers can use advanced signal measurement and analysis to recover sensitive data from this side channel. To address this problem, this article presents Maya, a simple and effective defense against power side channels. The idea is to use formal control to re-shape the power dissipated by a computer in an application-transparent mannerâ€Â"preventing attackers from learning any information about the applications that are running. With formal control, a controller can reliably keep power consumption close to a desired target function even when runtime conditions change unpredictably. By selecting the target function intelligently, the controller can make power to follow any desired shape, appearing to carry activity information which, in reality, is unrelated to the application. Maya can be implemented in privileged software, firmware and hardware. We implement Maya on three machines using only privileged threads against machine learning based attacks, and show its effectiveness and ease of deployment. Maya has already thwarted a newly developed remote power attack.
UR - http://www.scopus.com/inward/record.url?scp=85128600299&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85128600299&partnerID=8YFLogxK
U2 - 10.1109/MM.2022.3166886
DO - 10.1109/MM.2022.3166886
M3 - Article
AN - SCOPUS:85128600299
SN - 0272-1732
VL - 42
SP - 48
EP - 58
JO - IEEE Micro
JF - IEEE Micro
IS - 4
ER -