Detection of hardware based attacks using performance counters

View/Open
Cita com:
hdl:2117/408859
Document typeResearch report
Defense date2024-01-18
Rights accessOpen Access
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder
Abstract
Hardware attacks, such as Spectre or Meltdown, try to exploit vulnerabilities on the processor architecture, usually to gain access to privileged memory locations, producing leaks of critical information. Most of this attacks exploit out-of-order execution and also highly stress the computer’s cache, and both of these behaviours can be tracked using hardware performance counters (HPC).
In order to try to use HPCs in our advantage we:
1. Collected several samples of different attacks and HPCs
2. Collected an equivalent amount of samples from benign programs
3. Trained a Support Vector Machine to classify the execution as benign or malignant
CitationAndreu, D. [et al.]. Detection of hardware based attacks using performance counters. 2024.
Files | Description | Size | Format | View |
---|---|---|---|---|
Poster_HIPEAC_HPM.pdf | 1,146Mb | View/Open |