Power-noise viruses can be used as denial-of-service attacks by causing voltage emergencies in multi-core microprocessors that may lead to data corruptions and system crashes. In this paper, we present a run-time system for detecting and mitigating power-noise viruses. We present voltage noise data from a power-noise virus and benchmarks collected from an Arm multi-core processor, and we observe that the frequency of voltage emergencies is dramatically increasing during the execution of power-noise attacks. Based on this observation, we propose a regression model that allows for a run-time estimation of the severity of voltage emergencies by monitoring the frequency of voltage emergencies and the operating frequency of the microprocessor. F...
International audienceTypical SOC designs use processors and therefore, trust in such processor core...
Many threats that can undermine the reliability of a system can be realized at design, while others ...
Medical devices based on embedded systems are ubiq-uitous in clinical settings. Increasingly, they c...
Power-noise viruses can be used as denial-of-service attacks by causing voltage emergencies in multi...
In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of...
As processor clock gating becomes more and more prevalent, the resulting processor current fluctuati...
Increases in peak current draw and reductions in the oper-ating voltages of processors continue to a...
In recent years, circuit reliability in modern high-performance processors has become increasingly i...
The need for energy optimizations in modern systems forces CPU vendors to provide Dynamic Voltage Fr...
Parameter variations have become a dominant challenge in microprocessor design. Voltage variation is...
Microprocessor designers use techniques such as clock gat-ing to reduce power dissipation. An unfort...
textReliability is one of the important issues of recent microprocessor design. Processors must pro...
Abstract—Parameter variations have become a dominant chal-lenge in microprocessor design. Voltage va...
Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs a...
Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malici...
International audienceTypical SOC designs use processors and therefore, trust in such processor core...
Many threats that can undermine the reliability of a system can be realized at design, while others ...
Medical devices based on embedded systems are ubiq-uitous in clinical settings. Increasingly, they c...
Power-noise viruses can be used as denial-of-service attacks by causing voltage emergencies in multi...
In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of...
As processor clock gating becomes more and more prevalent, the resulting processor current fluctuati...
Increases in peak current draw and reductions in the oper-ating voltages of processors continue to a...
In recent years, circuit reliability in modern high-performance processors has become increasingly i...
The need for energy optimizations in modern systems forces CPU vendors to provide Dynamic Voltage Fr...
Parameter variations have become a dominant challenge in microprocessor design. Voltage variation is...
Microprocessor designers use techniques such as clock gat-ing to reduce power dissipation. An unfort...
textReliability is one of the important issues of recent microprocessor design. Processors must pro...
Abstract—Parameter variations have become a dominant chal-lenge in microprocessor design. Voltage va...
Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs a...
Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malici...
International audienceTypical SOC designs use processors and therefore, trust in such processor core...
Many threats that can undermine the reliability of a system can be realized at design, while others ...
Medical devices based on embedded systems are ubiq-uitous in clinical settings. Increasingly, they c...