Real-Time Detection of Power Analysis Attacks by Machine Learning of Power Supply Variations On-Chip

Author(s):  
Dmitry Utyamishev ◽  
Inna Partin-Vaisband
Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 689
Author(s):  
Tom Springer ◽  
Elia Eiroa-Lledo ◽  
Elizabeth Stevens ◽  
Erik Linstead

As machine learning becomes ubiquitous, the need to deploy models on real-time, embedded systems will become increasingly critical. This is especially true for deep learning solutions, whose large models pose interesting challenges for target architectures at the “edge” that are resource-constrained. The realization of machine learning, and deep learning, is being driven by the availability of specialized hardware, such as system-on-chip solutions, which provide some alleviation of constraints. Equally important, however, are the operating systems that run on this hardware, and specifically the ability to leverage commercial real-time operating systems which, unlike general purpose operating systems such as Linux, can provide the low-latency, deterministic execution required for embedded, and potentially safety-critical, applications at the edge. Despite this, studies considering the integration of real-time operating systems, specialized hardware, and machine learning/deep learning algorithms remain limited. In particular, better mechanisms for real-time scheduling in the context of machine learning applications will prove to be critical as these technologies move to the edge. In order to address some of these challenges, we present a resource management framework designed to provide a dynamic on-device approach to the allocation and scheduling of limited resources in a real-time processing environment. These types of mechanisms are necessary to support the deterministic behavior required by the control components contained in the edge nodes. To validate the effectiveness of our approach, we applied rigorous schedulability analysis to a large set of randomly generated simulated task sets and then verified the most time critical applications, such as the control tasks which maintained low-latency deterministic behavior even during off-nominal conditions. The practicality of our scheduling framework was demonstrated by integrating it into a commercial real-time operating system (VxWorks) then running a typical deep learning image processing application to perform simple object detection. The results indicate that our proposed resource management framework can be leveraged to facilitate integration of machine learning algorithms with real-time operating systems and embedded platforms, including widely-used, industry-standard real-time operating systems.


Author(s):  
Louise Beltzung ◽  
Andrew Lindley ◽  
Olivia Dinica ◽  
Nadin Hermann ◽  
Raphaela Lindner

2020 ◽  
Vol 10 (3) ◽  
pp. 984 ◽  
Author(s):  
Jonghyeon Cho ◽  
Taehun Kim ◽  
Soojin Kim ◽  
Miok Im ◽  
Taehyun Kim ◽  
...  

Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim. Hence, a spy can obtain secret information without alerting the victim. To resist this attack, many detection techniques have been proposed. However, these approaches have limitations as they do not operate in real time. This article proposes a real-time detection method against cache side channel attacks. The proposed technique performs the detection of cache side channel attacks immediately after observing a variation of the CPU counters. For this, Intel PCM (Performance Counter Monitor) and machine learning algorithms are used to measure the value of the CPU counters. Throughout the experiment, several PCM counters recorded changes during the attack. From these observations, a detecting program was implemented by using these counters. The experimental results show that the proposed detection technique displays good performance for real-time detection in various environments.


IBRO Reports ◽  
2019 ◽  
Vol 6 ◽  
pp. S414-S415
Author(s):  
Kyeongho Lee ◽  
Ingyu Park ◽  
Kausik Bishayee ◽  
Unjoo Lee

2016 ◽  
Vol 37 (3) ◽  
pp. 545-552 ◽  
Author(s):  
Yu Liu ◽  
Chen Li ◽  
Zhi Li ◽  
Samuel D. Chan ◽  
Daisuke Eto ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document