The power capacity of multi-tenant data centers is typically oversubscribed in order to increase the utilization of expensive power infrastructure. This practice can create dangerous situations and compromise data center availability if the designed power capacity is exceeded. This paper demonstrates that current safeguards are vulnerable to well-timed power attacks launched by malicious tenants (i.e., attackers). Further, we demonstrate that there is a physical side channel --- a thermal side channel due to hot air recirculation --- that contains information about the benign tenants' runtime power usage and can enable a malicious tenant to time power attacks effectively. In particular, we design a state-augmented Kalman filter to extract t...
Aging power industries together with an increase in the demand from industrial and residential custo...
The widespread adoption of the Internet of Things and latency-critical applications has fueled the b...
In the last years an increasing number of attacks targeting energy consumption in computing systems ...
Oversubscription increases the utilization of expensive power infrastructure in multi-tenant data ce...
Due to the increased popularity of cloud computing services, there is a need to increase the amount ...
Modern data centers employ complex and specialized power management architectures in the pursuit of ...
© 2016 IEEE. High performance data centers serve as the backbone of the prevailing cloud computing p...
International audienceVirtualized data centers where several virtual machines (VMs) are hosted per s...
Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from electronic...
Within a world that increasingly relies on connected devices, security and reliability have become m...
Future world is moving towards cloud computing In a word cloud computing can be defined as remote a...
This work analyzes a new and very subtle kind of security threat that can affect large-scale cloud-b...
Devices with high energy consumption such as air conditioners, water heaters, and electric vehicles ...
Data centers have been growing rapidly in recent years to meet the surging demand of cloud services....
abstract: Reliable operation of modern power systems is ensured by an intelligent cyber layer that m...
Aging power industries together with an increase in the demand from industrial and residential custo...
The widespread adoption of the Internet of Things and latency-critical applications has fueled the b...
In the last years an increasing number of attacks targeting energy consumption in computing systems ...
Oversubscription increases the utilization of expensive power infrastructure in multi-tenant data ce...
Due to the increased popularity of cloud computing services, there is a need to increase the amount ...
Modern data centers employ complex and specialized power management architectures in the pursuit of ...
© 2016 IEEE. High performance data centers serve as the backbone of the prevailing cloud computing p...
International audienceVirtualized data centers where several virtual machines (VMs) are hosted per s...
Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from electronic...
Within a world that increasingly relies on connected devices, security and reliability have become m...
Future world is moving towards cloud computing In a word cloud computing can be defined as remote a...
This work analyzes a new and very subtle kind of security threat that can affect large-scale cloud-b...
Devices with high energy consumption such as air conditioners, water heaters, and electric vehicles ...
Data centers have been growing rapidly in recent years to meet the surging demand of cloud services....
abstract: Reliable operation of modern power systems is ensured by an intelligent cyber layer that m...
Aging power industries together with an increase in the demand from industrial and residential custo...
The widespread adoption of the Internet of Things and latency-critical applications has fueled the b...
In the last years an increasing number of attacks targeting energy consumption in computing systems ...