fix clem comments
This commit is contained in:
parent
c06d1a7760
commit
3b2acada9c
2 changed files with 40 additions and 22 deletions
|
|
@ -1752,3 +1752,13 @@ pages={328-333},}
|
||||||
year={2017}
|
year={2017}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@inproceedings{Pradyumna_Pothukuchi_2021,
|
||||||
|
doi = {10.1109/isca52012.2021.00074},
|
||||||
|
url = {https://arxiv.org/abs/1907.09440},
|
||||||
|
year = 2021,
|
||||||
|
month = {jun},
|
||||||
|
publisher = {{IEEE}},
|
||||||
|
author = {Raghavendra Pradyumna Pothukuchi and Sweta Yamini Pothukuchi and Petros G. Voulgaris and Alexander Schwing and Josep Torrellas},
|
||||||
|
title = {Maya: Using Formal Control to Obfuscate Power Side Channels},
|
||||||
|
booktitle = {2021 {ACM}/{IEEE} 48th Annual International Symposium on Computer Architecture ({ISCA})}
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -4,7 +4,7 @@
|
||||||
%
|
%
|
||||||
\documentclass[runningheads]{llncs}
|
\documentclass[runningheads]{llncs}
|
||||||
%
|
%
|
||||||
\usepackage[T1]{fontenc}
|
%\usepackage[T1]{fontenc}
|
||||||
% T1 fonts will be used to generate the final print and online PDFs,
|
% T1 fonts will be used to generate the final print and online PDFs,
|
||||||
% so please use T1 fonts in your manuscript whenever possible.
|
% so please use T1 fonts in your manuscript whenever possible.
|
||||||
% Other font encondings may result in incorrect characters.
|
% Other font encondings may result in incorrect characters.
|
||||||
|
|
@ -62,6 +62,8 @@
|
||||||
% FAKES/ANONYMOUS
|
% FAKES/ANONYMOUS
|
||||||
%
|
%
|
||||||
\author{
|
\author{
|
||||||
|
\phantom{
|
||||||
|
\begin{minipage}{\textwidth}
|
||||||
Anon. Anonymous\and
|
Anon. Anonymous\and
|
||||||
Anon. Anonymous\and
|
Anon. Anonymous\and
|
||||||
Anon. Anonymous\and
|
Anon. Anonymous\and
|
||||||
|
|
@ -71,11 +73,13 @@ Anon. Anonymous\and
|
||||||
Anon. Anonymous\and
|
Anon. Anonymous\and
|
||||||
Anon. Anonymous\and
|
Anon. Anonymous\and
|
||||||
Anon. Anonymous
|
Anon. Anonymous
|
||||||
|
\end{minipage}
|
||||||
}
|
}
|
||||||
\authorrunning{Anon. et al.}
|
}
|
||||||
|
\authorrunning{ }
|
||||||
|
|
||||||
\institute{University of Anonymous, Nowhere. \\
|
\institute{ ~\\
|
||||||
anon@anonymous.nw}
|
}
|
||||||
%
|
%
|
||||||
\maketitle % typeset the header of the contribution
|
\maketitle % typeset the header of the contribution
|
||||||
%
|
%
|
||||||
|
|
@ -85,8 +89,8 @@ anon@anonymous.nw}
|
||||||
In the case of a compromized device, the detection capability of its \gls{hids} becomes untrustworthy.
|
In the case of a compromized device, the detection capability of its \gls{hids} becomes untrustworthy.
|
||||||
In this context, embedded systems such as network equipment remain vulnerable to firmware and hardware tampering, as well as log manipulation.
|
In this context, embedded systems such as network equipment remain vulnerable to firmware and hardware tampering, as well as log manipulation.
|
||||||
|
|
||||||
Side-channel emissions provide an independent and extrinsic source of information at the about the system, purely based on the physical by-product of its activities.
|
Side-channel emissions provide an independent and extrinsic source of information about the system, purely based on the physical by-product of its activities.
|
||||||
Leveraging side-channel information, we propose a physics-based \gls{ids} as an aditional layer of protection for embedded systems.
|
Leveraging side-channel information, we propose a physics-based \gls{ids} as an additional layer of protection for embedded systems.
|
||||||
The physic-based \gls{ids} uses machine-learning-based power analysis to monitor and assess the behaviour and integrity of network equipment.
|
The physic-based \gls{ids} uses machine-learning-based power analysis to monitor and assess the behaviour and integrity of network equipment.
|
||||||
|
|
||||||
The \gls{ids} successfully detects three different classes of attacks on an HP Procurve Network Switch 5406zl: (i)~firmware manipulation with \numprint[\%]{99} accuracy, (ii)~brute-force SSH login attempts with \numprint[\%]{98} accuracy, and (iii)~hardware tampering with \numprint[\%]{100} accuracy.
|
The \gls{ids} successfully detects three different classes of attacks on an HP Procurve Network Switch 5406zl: (i)~firmware manipulation with \numprint[\%]{99} accuracy, (ii)~brute-force SSH login attempts with \numprint[\%]{98} accuracy, and (iii)~hardware tampering with \numprint[\%]{100} accuracy.
|
||||||
|
|
@ -97,7 +101,6 @@ anon@anonymous.nw}
|
||||||
\end{abstract}
|
\end{abstract}
|
||||||
%
|
%
|
||||||
%
|
%
|
||||||
%
|
|
||||||
\glsresetall % reset all acronyms to be expanded on first use.
|
\glsresetall % reset all acronyms to be expanded on first use.
|
||||||
|
|
||||||
\section{Introduction}
|
\section{Introduction}
|
||||||
|
|
@ -114,25 +117,25 @@ Although \glspl{hids} and \glspl{nids} offer intrusion detection capabilities, t
|
||||||
|
|
||||||
The literature shows promising work in improving the state-of-the-art in security by analyzing side-channel emissions from embedded systems.
|
The literature shows promising work in improving the state-of-the-art in security by analyzing side-channel emissions from embedded systems.
|
||||||
Systems generate side-channel emissions, which usually reflect their activity in the form of power consumption \cite{kocher1999differential, brier2004correlation, Moreno2018}, electromagnetic waves \cite{khan2019malware, sehatbakhsh2019remote}, acoustic emissions \cite{genkin2014rsa, liuacoustic}, etc.
|
Systems generate side-channel emissions, which usually reflect their activity in the form of power consumption \cite{kocher1999differential, brier2004correlation, Moreno2018}, electromagnetic waves \cite{khan2019malware, sehatbakhsh2019remote}, acoustic emissions \cite{genkin2014rsa, liuacoustic}, etc.
|
||||||
Side-channel based \glspl{ids} analyze side-channel emissions and can complement state-of-art \glspl{ids}, as shown in this paper.
|
Side-channel-based \glspl{ids} analyze side-channel emissions and can complement state-of-art \glspl{ids}, as shown in this paper.
|
||||||
The \gls{ids} uses \gls{dsp} and \gls{ml} to detect anomalies or recognize patterns of previously detected intrusions.
|
The \gls{ids} uses \gls{dsp} and \gls{ml} to detect anomalies or recognize patterns of previously detected intrusions.
|
||||||
Thus, using this \gls{ids} would improve the security of the embedded system by detecting attacks that regular \glspl{ids} fail to identify.
|
Thus, using this \gls{ids} would improve the security of the embedded system by detecting attacks that regular \glspl{ids} fail to identify.
|
||||||
|
|
||||||
\subsection{Contributions}
|
\subsection{Contributions}
|
||||||
|
|
||||||
This paper proposes a side-channel-based \gls{ids} that can complement existing \glspl{ids} and improve security for embedded systems.
|
This paper proposes a side-channel-based \gls{ids} --- also called physics-based \gls{ids} --- that can complement existing \glspl{ids} and improve security for embedded systems.
|
||||||
The side-channel based \gls{ids} can potentially protect any embedded system treated a black box and detect a range of attacks against it.
|
The side-channel-based \gls{ids} can potentially protect any embedded system treated as a black box and detect a range of attacks against it.
|
||||||
Our \gls{ids} is deployed on an HP Procurve 5406zl network switch as a black box.
|
Our \gls{ids} is deployed on an HP Procurve 5406zl network switch as a black box.
|
||||||
The experiments in the paper illustrate the \gls{ids} capabilities of detecting firmware manipulation and hardware tampering attacks against the switch and defending against log entry forging through log verification.
|
The experiments in the paper illustrate the \gls{ids} capabilities of detecting firmware manipulation and hardware tampering attacks against the switch and defending against log entry forging through log verification.
|
||||||
|
|
||||||
The side-channel based \gls{ids} achieves near-perfect accuracy scores despite using simple \gls{dsp} methods and \gls{ml} algorithms. The algorithms analyze \gls{ac} and \gls{dc} power consumption of the network switch to detect these attacks.
|
The side-channel-based \gls{ids} achieves near-perfect accuracy scores despite using simple \gls{dsp} methods and \gls{ml} algorithms. The algorithms analyze \gls{ac} and \gls{dc} power consumption of the network switch to detect these attacks.
|
||||||
%The experiments use a relatively small dataset that contains roughly \numprint{1000} power traces.
|
%The experiments use a relatively small dataset that contains roughly \numprint{1000} power traces.
|
||||||
|
|
||||||
\subsection{Paper Organization}
|
\subsection{Paper Organization}
|
||||||
|
|
||||||
The paper is organized as follows:
|
The paper is organized as follows:
|
||||||
Section~\ref{sec:Overview} provides an overview of the motivation for the experiments and threat model.
|
Section~\ref{sec:Overview} provides an overview of the motivation for the experiments and threat model.
|
||||||
Section~\ref{Related Work} describe other side-channel-based approaches for runtime monitoring and integrity assessment.
|
Section~\ref{Related Work} describes other side-channel-based approaches for runtime monitoring and integrity assessment.
|
||||||
Section~\ref{Firmware} describes experiments related to firmware manipulation,
|
Section~\ref{Firmware} describes experiments related to firmware manipulation,
|
||||||
Section~\ref{RunTime} describes log verification and auditing,
|
Section~\ref{RunTime} describes log verification and auditing,
|
||||||
and Section~\ref{Hardware} describes hardware tampering.
|
and Section~\ref{Hardware} describes hardware tampering.
|
||||||
|
|
@ -177,7 +180,7 @@ This independence is also beneficial in case of a malfunction of the \gls{ids},
|
||||||
|
|
||||||
|
|
||||||
\end{tabularx}
|
\end{tabularx}
|
||||||
\caption{Attack scenarios that side-channel based \gls{ids} can detect.}
|
\caption{Attack scenarios that side-channel-based \gls{ids} can detect.}
|
||||||
\label{tab:example}
|
\label{tab:example}
|
||||||
\end{table}
|
\end{table}
|
||||||
|
|
||||||
|
|
@ -213,7 +216,7 @@ In the context of \gls{ids} for network equipment, we considered power consumpti
|
||||||
After initial tests, power consumption proved to provide the most information about the system state relative to the practicality of measurement.
|
After initial tests, power consumption proved to provide the most information about the system state relative to the practicality of measurement.
|
||||||
|
|
||||||
In our setup, the power consumption of the device is measured in two different ways: measurement at the \gls{ac} line (between the device's \gls{psu} and the power outlet); and measurement at the \gls{dc} power (from the \gls{psu} to the motherboard of the device).
|
In our setup, the power consumption of the device is measured in two different ways: measurement at the \gls{ac} line (between the device's \gls{psu} and the power outlet); and measurement at the \gls{dc} power (from the \gls{psu} to the motherboard of the device).
|
||||||
For both \gls{ac} and \gls{dc}, a power measurment box is placed in series with the main power cable.
|
For both \gls{ac} and \gls{dc}, a power measurement device is placed in series with the main power cable.
|
||||||
The box measures the voltage drop generated by the current flowing through a shunt resistor.
|
The box measures the voltage drop generated by the current flowing through a shunt resistor.
|
||||||
This box samples the voltage at one mega sample per seconds (1MSPS).
|
This box samples the voltage at one mega sample per seconds (1MSPS).
|
||||||
During every operation of the device, the different instructions influence the overall power consumption \cite{727070} and will be detectable in either \gls{ac} and \gls{dc} power consumption.
|
During every operation of the device, the different instructions influence the overall power consumption \cite{727070} and will be detectable in either \gls{ac} and \gls{dc} power consumption.
|
||||||
|
|
@ -223,7 +226,7 @@ However, its \gls{snr} is lower compared to the \gls{dc} measurement because the
|
||||||
|
|
||||||
\section{Related Work}
|
\section{Related Work}
|
||||||
\label{Related Work}
|
\label{Related Work}
|
||||||
The idea of side-channel based \gls{ids} traces back to the seminal work in side-channel analysis by Paul C. Kocher.
|
The idea of side-channel-based \gls{ids} traces back to the seminal work in side-channel analysis by Paul C. Kocher.
|
||||||
He introduced Differential Power Analysis to find secret keys used by cryptographic protocols in tamper-resistant devices~\cite{kocher1999differential}.
|
He introduced Differential Power Analysis to find secret keys used by cryptographic protocols in tamper-resistant devices~\cite{kocher1999differential}.
|
||||||
This led to a field of research focusing on side-channel analysis that has been growing since. Power analysis is the most common and widely studied side-channel analysis technique~\cite{brier2004correlation,mangard2008power}. %new citations%
|
This led to a field of research focusing on side-channel analysis that has been growing since. Power analysis is the most common and widely studied side-channel analysis technique~\cite{brier2004correlation,mangard2008power}. %new citations%
|
||||||
Cagalj et al.~\cite{vcagalj2014timing} show a successful passive side-channel timing attack on U.S. patent Mod 10 method and Hopper-Blum (HB) protocol.
|
Cagalj et al.~\cite{vcagalj2014timing} show a successful passive side-channel timing attack on U.S. patent Mod 10 method and Hopper-Blum (HB) protocol.
|
||||||
|
|
@ -255,6 +258,11 @@ They use HDBSCAN clustering method to identify anomalous behaviour exhibited by
|
||||||
Yilmaz et al.~\cite{yilmaz2019detecting} implement K-Nearest Neighbors clustering methods along with PCA dimensionality reduction method to model EM emanations from a phone with the different operational status of front/rear camera.
|
Yilmaz et al.~\cite{yilmaz2019detecting} implement K-Nearest Neighbors clustering methods along with PCA dimensionality reduction method to model EM emanations from a phone with the different operational status of front/rear camera.
|
||||||
Using the ML methods, they can determine the state of cellphone cameras.
|
Using the ML methods, they can determine the state of cellphone cameras.
|
||||||
|
|
||||||
|
Some work also investigated the possibility of forging power consumption for defense purposes.
|
||||||
|
Raghavendra et al.~\cite{Pradyumna_Pothukuchi_2021} proposed a simple control method to mask the power consumption pattern of any application.
|
||||||
|
However, this kind of method does not enable masking into an arbitrary pattern as it is meant for obfuscation, not impersonation.
|
||||||
|
Thus an attacker could not leverage this method to make an activity (malware) impersonate another one (legit activity) from a power consumption point of view.
|
||||||
|
|
||||||
%The work that this paper proposes builds on top of the aforementioned works.
|
%The work that this paper proposes builds on top of the aforementioned works.
|
||||||
%An HP network switch, treated as a black box, generates side-channel leaks in the form of its power consumption.
|
%An HP network switch, treated as a black box, generates side-channel leaks in the form of its power consumption.
|
||||||
%The experiments treat this power consumption as an output of the system when the inputs are certain attacks/stimuli that triggers the switch.
|
%The experiments treat this power consumption as an output of the system when the inputs are certain attacks/stimuli that triggers the switch.
|
||||||
|
|
@ -271,8 +279,8 @@ Starting from the pre-installed version K.15.06.008, we performed upgrades to th
|
||||||
|
|
||||||
\subsubsection{Feature Engineering}\label{FE-Firmware}
|
\subsubsection{Feature Engineering}\label{FE-Firmware}
|
||||||
|
|
||||||
With the HP Procurve Switch 5406zl taking around 120 seconds to complete its boot-up sequence, this experiment family produces the largest datasets of this case study.
|
With the HP Procurve Switch 5406zl taking around 120 seconds to complete its boot-up sequence, this experiment family produces the largest dataset of this case study.
|
||||||
Therefore, several preprocessing steps were applied to reduce the size of the datasets and remove noise.
|
Therefore, several preprocessing steps were applied to reduce the size of the dataset and remove noise.
|
||||||
A combination of downsampling and a sliding median filter yields the best results at a minimal size per training set.
|
A combination of downsampling and a sliding median filter yields the best results at a minimal size per training set.
|
||||||
Given a power trace with a length of \numprint{120e6} datapoints, downsampling with a factor of \numprint{1e6} results in a sample size of 120 and provides an overall accuracy of \numprint[\%]{99} for this experiment.
|
Given a power trace with a length of \numprint{120e6} datapoints, downsampling with a factor of \numprint{1e6} results in a sample size of 120 and provides an overall accuracy of \numprint[\%]{99} for this experiment.
|
||||||
This process enables training accurate machine-learning models (see Table~\ref{tab:fw-results}) with less than \numprint{1000} training samples, each consisting of 120 datapoints (See Figure~\ref{fig:firmwares-samples}).
|
This process enables training accurate machine-learning models (see Table~\ref{tab:fw-results}) with less than \numprint{1000} training samples, each consisting of 120 datapoints (See Figure~\ref{fig:firmwares-samples}).
|
||||||
|
|
@ -292,7 +300,7 @@ Figure~\ref{fig:firmwares} illustrates the captured data for two different firmw
|
||||||
\caption{Median-filtered power traces of boot-up sequences for two different firmware versions (ten captures each).}
|
\caption{Median-filtered power traces of boot-up sequences for two different firmware versions (ten captures each).}
|
||||||
\label{fig:firmwares-samples}
|
\label{fig:firmwares-samples}
|
||||||
\end{subfigure}
|
\end{subfigure}
|
||||||
\begin{subfigure}{0.49\textwidth}
|
\begin{subfigure}{0.45\textwidth}
|
||||||
\centering
|
\centering
|
||||||
\includegraphics[width=\linewidth]{images/psd.pdf}
|
\includegraphics[width=\linewidth]{images/psd.pdf}
|
||||||
\caption{PSD of power traces of boot-up sequences for two different firmware versions (two traces for each version).}
|
\caption{PSD of power traces of boot-up sequences for two different firmware versions (two traces for each version).}
|
||||||
|
|
@ -551,7 +559,7 @@ The \gls{ac} periods do present different patterns depending on the number of mo
|
||||||
The \gls{svm} model was able to identify the number of modules installed with an accuracy of \numprint[\%]{99}.
|
The \gls{svm} model was able to identify the number of modules installed with an accuracy of \numprint[\%]{99}.
|
||||||
|
|
||||||
Results from Table~\ref{tab:hardware-results} show that \gls{dc} data yields the best results.
|
Results from Table~\ref{tab:hardware-results} show that \gls{dc} data yields the best results.
|
||||||
These high accuracy and recall performances are the result of the non-overlapping grouping of the averages \gls{dc} consummations.
|
These high accuracy and recall performances are the result of the non-overlapping grouping of the averages \gls{dc} consumptions.
|
||||||
The results presented are produced with a stratified 10-fold cross-validation setup.
|
The results presented are produced with a stratified 10-fold cross-validation setup.
|
||||||
|
|
||||||
\begin{table}[ht]
|
\begin{table}[ht]
|
||||||
|
|
@ -597,7 +605,7 @@ The lightweight nature of the models allows for fast online run-time monitoring
|
||||||
\label{Conclusion}
|
\label{Conclusion}
|
||||||
|
|
||||||
This paper introduces a physics-based \gls{ids} that offers a novel and complementary type of runtime monitoring and integrity assessment for network equipment.
|
This paper introduces a physics-based \gls{ids} that offers a novel and complementary type of runtime monitoring and integrity assessment for network equipment.
|
||||||
The proposed \gls{ids} leverages side-channel information generated by the system at the physical level and infer the system's state and activities to detect attacks.
|
The proposed \gls{ids} leverages side-channel information generated by the system at the physical level and infers the system's state and activities to detect attacks.
|
||||||
This paper presents en evaluation of the performances against hardware tampering, firmware manipulation, and log tampering.
|
This paper presents en evaluation of the performances against hardware tampering, firmware manipulation, and log tampering.
|
||||||
The results show that the used methods achieve near perfect accuracy on all experiments with only a small training set.
|
The results show that the used methods achieve near perfect accuracy on all experiments with only a small training set.
|
||||||
Overall, the introduced techniques provide a glimpse on a general concept that is extensible to other real-time and embedded systems.
|
Overall, the introduced techniques provide a glimpse on a general concept that is extensible to other real-time and embedded systems.
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue