Hardware Performance Counters: Ready-Made vs Tailor-Made

2021 ◽  
Vol 20 (5s) ◽  
pp. 1-26
Author(s):  
Abraham Peedikayil Kuruvila ◽  
Anushree Mahapatra ◽  
Ramesh Karri ◽  
Kanad Basu

Micro-architectural footprints can be used to distinguish one application from another. Most modern processors feature hardware performance counters to monitor the various micro-architectural events when an application is executing. These ready-made hardware performance counters can be used to create program fingerprints and have been shown to successfully differentiate between individual applications. In this paper, we demonstrate how ready-made hardware performance counters, due to their coarse-grain nature (low sampling rate and bundling of similar events, e.g., number of instructions instead of number of add instructions), are insufficient to this end. This observation motivates exploration of tailor-made hardware performance counters to capture fine-grain characteristics of the programs. As a case study, we evaluate both ready-made and tailor-made hardware performance counters using post-quantum cryptographic key encapsulation mechanism implementations. Machine learning models trained on tailor-made hardwareperformance counter streams demonstrate that they can uniquely identify the behavior of every post-quantum cryptographic key encapsulation mechanism algorithm with at least 98.99% accuracy.

2021 ◽  
Author(s):  
Juan-David Guerrero-Balaguera ◽  
Josie E. Rodriguez Condia ◽  
Matteo Sonza Reorda

2022 ◽  
Vol 14 (1) ◽  
pp. 24
Author(s):  
Hui Yan ◽  
Chaoyuan Cui

Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on these addresses. This paper proposes CacheHawkeye, which uses the frequent memory access characteristic of the attacker to detect attacks. CacheHawkeye monitors memory events by CPU hardware performance counters. We proved the effectiveness of CacheHawkeye on Flush+Reload and Flush+Flush attacks. In addition, we evaluated the accuracy of CacheHawkeye under different system loads. Experiments demonstrate that CacheHawkeye not only has good accuracy but can also adapt to various system loads.


Author(s):  
Muhamed Fauzi Bin Abbas ◽  
Sai Praveen Kadiyala ◽  
Alok Prakash ◽  
Thambipillai Srikanthan ◽  
Yan Lin Aung

2020 ◽  
Vol 35 (2) ◽  
pp. 412-417
Author(s):  
Wen-Yan Chen ◽  
Ke-Jiang Ye ◽  
Cheng-Zhi Lu ◽  
Dong-Dai Zhou ◽  
Cheng-Zhong Xu

Sign in / Sign up

Export Citation Format

Share Document