SlideShare ist ein Scribd-Unternehmen logo
1 von 57
Shielding
Performance Monitor
Counters:
a double edge
weapon for safety and
security
A. Carelli, A. Vallero
and S. Di Carlo
24th IEEE International Symposium on On-Line Testing
and Robust System Design
Hotel Cap Roig, Platja d’Aro, Costa Brava, Spain, July
2-4, 2018
• The application of Cyber Physical Systems (CPSs) is becoming pervasive,
even for critical structures
• Safety and security must be taken into account to prevent misbehavior
leading to catastrophic consequences.
• In modern microprocessors the usage of Performance Monitor Counters
(PMCs):
✚ helps to detect timing violations and other physical failure
⁃ Can be exploited to perform attack compromising security
MOTIVATIONS
What is the relation between safety and security of
Cyber Physical Systems?
• The application of Cyber Physical Systems (CPSs) is becoming pervasive,
even for critical structures
• Safety and security must be taken into account to prevent misbehavior
leading to catastrophic consequences.
• In modern microprocessors the usage of Performance Monitor Counters
(PMCs):
✚ helps to detect timing violations and other physical failure
⁃ Can be exploited to perform attack compromising security
MOTIVATIONS
What is the relation between safety and security of
Cyber Physical Systems?We want to
protect PMC from
security attacks
without
compromising
safety
OUTLINE
CPS architecture
Attack mitigation
Experimental results
Conclusions
CPS ARCHITECTURE
The system
Monitor
Node
0
…
Node
N
Sensors & Actuators
CPS ARCHITECTURE
The nodes
Node
N
Tasks
Service
s
Encryption
Service
PMC
Service
Performanc
e Monitor
Counters
K
E
Y
Applications
Operating
System
uProcessor
Monitor
Node
0 …
Sensors & Actuators
CPS ARCHITECTURE
The nodes
Tasks
Service
s
Encryption
Service
PMC
Service
Performanc
e Monitor
Counters
K
E
Y
Applications
Operating
System
uProcessor
Safety
tasks
Sensors & Actuators
Node
N
Monitor
Node
0 …
CPS ARCHITECTURE
Safety task
Safety
tasks
PMC
Service
Performanc
e Monitor
Counters
Applications
Operating
System
uProcessor
1) Off-line phase: PMCs profiling
2) On-line phase: PMCs monitoring
Safety is guaranteed
through PMCs as
proposed in [S.Esposito
et al., ACM-TECS, 2017]
SAFETY TECHNIQUE
Detecting deadline misses
Off-line phase: PMCs profiling
Cumulative Distribution Function
(CDF) of the execution time of an
application
What is the
probability the
execution time of the
application is lower
than t?
• Profile each application to collect PMC
values related to their execution time
SAFETY TECHNIQUE
Detecting deadline misses
Off-line phase: PMCs profiling
Cumulative Distribution Function
(CDF) of the execution time of an
application
• Profile each application to collect PMC
values related to their execution time
• Define 2 thresholds related to the CDF
in order to decide when the execution of
an application is safe or critical
• Profile each application to collect PMC
values related to their execution time
• Define 2 thresholds related to the CDF
in order to decide when the execution of
an application is safe or critical
SAFETY TECHNIQUE
Detecting deadline misses
Off-line phase: PMCs profiling
Cumulative Distribution Function
(CDF) of the execution time of an
application
Warning Threshold - WTH
Critical Threshold - CTH
𝑃 𝑋 > 𝑊𝑇𝐻 < 𝐶 𝑊 → 𝐹𝑋 𝑊𝑇𝐻 > 1 − 𝐶 𝑊
𝑃 𝑋 > 𝐶 𝑇𝐻 < 𝐶 𝐶 → 𝐹𝑋 𝐶 𝑇𝐻 > 1 − 𝐶 𝐶
WTH
CW
CC
CTH
SAFETY TECHNIQUE
Detecting deadline misses
• Profile each application to collect PMC
values related to their execution time
• Define 2 thresholds related to the CDF
in order to decide when the execution of
an application is safe or critical
• Decide if the execution of an application
is critical or not critical
Cumulative Distribution Function
(CDF) of the execution time of an
application
On-line phase: PMCs monitoring CTH
SAFETY TECHNIQUE
Detecting deadline misses
• Profile each application to collect PMC
values related to their execution time
• Define 2 thresholds related to the CDF
in order to decide when the execution of
an application is safe or critical
• Decide if the execution of an application
is critical or not critical
Cumulative Distribution Function
(CDF) of the execution time of an
application
When the execution
time of an
application exceeds
CTH is classified as
critical
Critical AreaOn-line phase: PMCs monitoring
SAFETY TECHNIQUE
Detecting deadline misses
• Profile each application to collect PMC
values related to their execution time
• Define 2 thresholds related to the CDF
in order to decide when the execution of
an application is safe or critical
• Decide if the execution of an application
is critical or not critical
• Decide if the execution of an application
is safe or potentially critical
Cumulative Distribution Function
(CDF) of the execution time of an
application
On-line phase: PMCs monitoring WTH
• Profile each application to collect PMC
values related to their execution time
• Define 2 thresholds related to the CDF in
order to decide when the execution of
an application is safe or critical
• Decide if the execution of an application
is critical or not critical
• Decide if the execution of an application
is safe or potentially critical
SAFETY TECHNIQUE
Detecting deadline misses
Cumulative Distribution Function
(CDF) of the execution time of an
application
Safe Area
When the execution
time of an
application is lower
than WTH is
classified as safe
On-line phase: PMCs monitoring
SAFETY TECHNIQUE
Detecting deadline misses
• Profile each application to collect PMC
values related to their execution time
• Define 2 thresholds related to the CDF
in order to decide when the execution of
an application is safe or critical
• Decide if the execution of an application
is critical or not critical
• Decide if the execution of an application
is safe or potentially critical
Cumulative Distribution Function
(CDF) of the execution time of an
application
Warning AreaWhen the
execution time of
an application is
between WTH and
CTH is classfied as
potentially critical
On-line phase: PMCs monitoring
On-line phase: PMCs monitoring
SAFETY TECHNIQUE
Detecting deadline misses
• Profile each application to collect PMC
values related to their execution time
• Define 2 thresholds related to the CDF in
order to decide when the execution of
an application is safe or critical
• Decide if the execution of an application
is critical or not critical
• Decide if the execution of an application
is safe or potentially critical
Cumulative Distribution Function
(CDF) of the execution time of an
application
Warning Area
If the application is
classified as
potentially critical
for α-times
consecutively, the
application is
classified as critical
CPS ARCHITECTURE
Attack Model
Tasks
Safety
tasks
Maliciou
s task
Service
s
Encryption
Service
PMC
Service
Performanc
e Monitor
Counters
K
E
Y
Applications
Operating
System
uProcessor
Side-channel attack based on
PMCs
[Bonneau et al., CHES, 2006]
• Target: AES encryption key
• Exploits the data locality of the
final round S-box in cache
memories
• Evolves a guessed key according
to encryption time and ciphertext
We assume that the attacker can
• inject malicious tasks in a node
• probe PMCs and trigger the
encryption process
ATTACK MITIGATION
Finding the correct dose of poison for PMCs
Service
s
Encryption
Service
PMC
Service
Performanc
e Monitor
Counters
K
E
Y
Operating
System
uProcessor
Solution:
Poison the values of PMCs to
neutralize the attack
ATTACK MITIGATION
Finding the correct dose of poison for PMCs
Service
s
Encryption
Service
PMC
Service
Performanc
e Monitor
Counters
K
E
Y
Operating
System
uProcessor
Solution:
Poison the values of PMCs to
neutralize the attack
The safety task will be
affected by the poisoning
too, thus it might fail!
ATTACK MITIGATION
Finding the correct dose of poison for PMCs
Service
s
Encryption
Service
PMC
Service
Performanc
e Monitor
Counters
K
E
Y
Operating
System
uProcessor
Solution:
Poison the values of PMCs to
neutralize the attack
What’s your poison???
• Fixed value alteration
• Random value alteration
ATTACK MITIGATION
Finding the correct dose of poison for PMCs
On-line phase: PMCs monitoring
Both Safety task and
malicious task monitor
PMCs.
As countermeasure for the
attack, the PMC value is
altered
𝑃𝑀𝐶 = 𝑃𝑀𝐶 + 𝑐
Tasks
Safety
tasks
Maliciou
s task
Service
s
Encryption
Service
PMC
Service
Performance
Monitor
Counters
K
E
Y
Applications
Operating
System
uProcessor
𝑐 = 𝑈(0, 𝑠 × (𝑊𝑇𝐻 − 𝜇)/2)
• s is a scaling factor
• µ is the average of PMC
value
uProcessor
ATTACK MITIGATION
Finding the correct dose of poison for PMCs
On-line phase: PMCs monitoring
Both Safety task and
malicious task monitor
PMCs.
As countermeasure for the
attack, the PMC value is
altered
𝑃𝑀𝐶 = 𝑃𝑀𝐶 + 𝑐
Tasks
Safety
tasks
Maliciou
s task
Service
s
Encryption
Service
PMC
Service
Performance
Monitor
Counters
K
E
Y
Applications
Operating
System
𝑐 = 𝑈(0, 𝑠 × (𝑊𝑇𝐻 − 𝜇)/2)
• s is a scaling factor
• µ is the average of PMC
value
WTHµ CTH
uProcessor
ATTACK MITIGATION
Finding the correct dose of poison for PMCs
On-line phase: PMCs monitoring
Both Safety task and
malicious task monitor
PMCs.
As countermeasure for the
attack, the PMC value is
altered
𝑃𝑀𝐶 = 𝑃𝑀𝐶 + 𝑐
Tasks
Safety
tasks
Maliciou
s task
Service
s
Encryption
Service
PMC
Service
Performance
Monitor
Counters
K
E
Y
Applications
Operating
System
𝑐 = 𝑈(0, 𝑠 × (𝑊𝑇𝐻 − 𝜇)/2)
• s is a scaling factor
• µ is the average of PMC
value
WTHµ CTH
EXPERIMENTAL RESULTS
Experimental Setup
• Experiments are conduced on a Slave node
• It runs 7 applications:
⁃ MiBench [*] benchmarks used: cjpeg, djpeg, fft, qsort, susan smoothing, susan
edges and susan corners
• Linux-like Operating System, with additional modules implemented:
⁃ PMC reading service
⁃ encryption service (AES algorithm)
• PMC considered: Clock Cycle Counter (on Intel Core i7 Q720 @1.6
GHz)
• 100 K samples, repeated 1,000 times for each application
• CW = 5% and CC = 0.6%
[*] M.R. Guthaus et al., IEEE-WWC-4, 2001
EXPERIMENTAL RESULTS
Experimental Setup
• Experiments are conduced on a Slave node
• It runs 7 applications:
⁃ MiBench [*] benchmarks used: cjpeg, djpeg, fft, qsort, susan smoothing, susan
edges and susan corners
• Linux-like Operating System, with additional modules implemented:
⁃ PMC reading service
⁃ encryption service (AES algorithm)
• PMC considered: Clock Cycle Counter (on Intel Core i7 Q720 @1.6
GHz)
• 100 K samples, repeated 1,000 times for each application
• CW = 5% and CC = 0.6%
[*] M.R. Guthaus et al., IEEE-WWC-4, 2001
Cumulative Distribution Function
(CDF) of the execution time of an
application
WTH
CW
CC
CTH
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8 and α=3
Task (%) misclassified as critical
0
0.0005
0.001
0.0015
0.002
0.0025
0.003
0.0035
0.004
0.0045
0.005
enc fft cjpeg djpeg qsort corn edges smooth avg
s-0.2
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8 and α=3
Task (%) misclassified as critical
0
0.002
0.004
0.006
0.008
0.01
0.012
enc fft cjpeg djpeg qsort corn edges smooth avg
s-0.4
s-0.2
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8 and α=3
Task (%) misclassified as critical
0
0.002
0.004
0.006
0.008
0.01
0.012
0.014
enc fft cjpeg djpeg qsort corn edges smooth avg
s-0.6
s-0.4
s-0.2
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8 and α=3
Task (%) misclassified as critical
0
0.002
0.004
0.006
0.008
0.01
0.012
0.014
0.016
enc fft cjpeg djpeg qsort corn edges smooth avg
s-0.8
s-0.6
s-0.4
s-0.2
0
0.002
0.004
0.006
0.008
0.01
0.012
0.014
0.016
enc fft cjpeg djpeg qsort corn edges smooth avg
s-0.8
s-0.6
s-0.4
s-0.2
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8 and α=3
Task (%) misclassified as critical
Increasing values of scaling
factor s the percentage of
misclassified executions
increases
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8 and α=3
Percentage of samples misclassified as critical
-0.002
0
0.002
0.004
0.006
0.008
0.01
0.012
Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err
enc fft cjpeg djpeg qsort corn edges smooth avg
s-0.8
s-0.6
s-0.4
s-0.2
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8 and α=3
Percentage of samples misclassified as critical
-0.002
0
0.002
0.004
0.006
0.008
0.01
0.012
Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err
enc fft cjpeg djpeg qsort corn edges smooth avg
s-0.8
s-0.6
s-0.4
s-0.2
The increase of Err
and WrnToErr
depends on the
CDF of each
benchmark
EXPERIMENTAL RESULTS
s = 0.5 and ranging the a-factor from 2 to 5
Recovery actions: False positives Vs. Correct detections
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
enc fft cjpeg djpeg qsort corn edges smooth avg
0.00%
0.50%
1.00%
1.50%
2.00%
2.50%
3.00%
3.50%
Critical
EXPERIMENTAL RESULTS
s = 0.5 and ranging the a-factor from 2 to 5
Recovery actions: False positives Vs. Correct detections
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
a-3
a-2-s-0.5
a-3-s-0.5
a-4-s-0.5
a-5-s-0.5
enc fft cjpeg djpeg qsort corn edges smooth avg
0.00%
0.50%
1.00%
1.50%
2.00%
2.50%
3.00%
3.50%
Critical
In some cases, a-
factor reduces the
number of false
positives
EXPERIMENTAL RESULTS
Security perspective
65
163
204
SAMPLES (MILION)
SAMPLES NEEDED TO RECOVER THE KEY
No protection s=0.2 s=0.4
~2.5x
~3.1x
• We presented the interplay between safety and
security aspects in the design of a CPS
• The PMCs play a double role:
⁃ on the one hand they are employed for a safety mechanism
⁃ on the other hand, they can be exploited as a security
vulnerability
• We proposed an attack mitigation strategy
• Further on-going work is underway to extend case
study
CONCLUSIONS
Final remarks
Questions?
39
http://www.testgroup.polito.it
TestGroup
@TestGroupPolito
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8
Task (%) classified as safe, with and without corruption
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
enc fft cjpeg djpeg qsort corn edges smooth avg
96.5%
97.0%
97.5%
98.0%
98.5%
99.0%
99.5%
EXPERIMENTAL RESULTS
Task (%) classified as safe, with and without corruption
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
enc fft cjpeg djpeg qsort corn edges smooth avg
96.5%
97.0%
97.5%
98.0%
98.5%
99.0%
99.5%
Scaling factor s ranging from 0.2 to 0.8
Task (%) classified as safe, with and without corruption
Increasing values of scaling
factor s underestimate the
percentage of safe
classification
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8
Percentage of samples not directly classified as safe
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
enc fft cjpeg djpeg qsort corn edges smooth avg
0%
1%
2%
3%
4%
5%
6%
7%
8%
9%
WrnToOk WrnToErr Err
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8
Percentage of samples not directly classified as safe
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
enc fft cjpeg djpeg qsort corn edges smooth avg
0%
1%
2%
3%
4%
5%
6%
7%
8%
9%
WrnToOk WrnToErr Err
The increase of s
translates into an
increase of warnings,
however the a-factor
mitigates the increase of
Err
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8
Percentage of samples classified as critical
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
enc fft cjpeg djpeg qsort corn edges smooth avg
0.0%
0.5%
1.0%
1.5%
2.0%
2.5%
3.0%
WrnToErr Err
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8
Percentage of samples classified as critical
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
enc fft cjpeg djpeg qsort corn edges smooth avg
0.0%
0.5%
1.0%
1.5%
2.0%
2.5%
3.0%
WrnToErr Err
The increase of Err
and WrnToErr
depends on the
CDF of each
benchmark
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8
Recovery actions: False positives Vs. Correct detections
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
enc fft cjpeg djpeg qsort corn edges smooth avg
0%
20%
40%
60%
80%
100%
120%
140%
160%
EXPERIMENTAL RESULTS
Scaling factor s ranging from 0.2 to 0.8
Recovery actions: False positives Vs. Correct detections
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
a-3
a-3-s0.2
a-3-s0.4
a-3-s0.6
a-3-s0.8
enc fft cjpeg djpeg qsort corn edges smooth avg
0%
20%
40%
60%
80%
100%
120%
140%
160%
The increase of s
translates into an
increase of false positives
•Without PMC protection: attack successful
in 65M samples
•With PMC protection:
⁃Attack successful after 163M (~2.5x) of
samples (s=0.2)
⁃Attack successful after 204M (~3.1x) of
samples (s=0.4)
EXPERIMENTAL RESULTS
Security perspective
•Without PMC protection: attack successful
in 65M samples
•With PMC protection:
⁃Attack successful after 163M (~2.5x) of
samples (s=0.2)
⁃Attack successful after 204M (~3.1x) of
samples (s=0.4)
EXPERIMENTAL RESULTS
Security perspective
Best conditions for
the attacker!
(lowest corruption
value)
SAFETY TECHNIQUE
Finding the correct dose of poison for PMCs
Off-line phase: PMCs profiling
• Profile tasks to collect PMC
values related to the execution
time
Time Profile for a Task
ExecutionTime
(ClockCycles)
Iteration
Time Profile for a Task
SAFETY TECHNIQUE
Finding the correct dose of poison for PMCs
Off-line phase: PMCs profiling
𝑃 𝑋 > 𝑇 𝑊 < 𝐶 𝑊 → 𝐹𝑋 𝑇 𝑊 > 1 − 𝐶 𝑊
𝑃 𝑋 > 𝑇𝐶 < 𝐶 𝐶 → 𝐹𝑋 𝑇𝐶 > 1 − 𝐶 𝐶
• Profile tasks to collect PMC
values
• Define 3 operating areas:
• safe, warning, critical
• Respective thresholds TW and TC
are based on confidence levels
(CW and CC)
Critical Area
SAFETY TECHNIQUE
Finding the correct dose of poison for PMCs
Off-line phase: PMCs profiling
𝑃 𝑋 > 𝑇 𝑊 < 𝐶 𝑊 → 𝐹𝑋 𝑇 𝑊 > 1 − 𝐶 𝑊
𝑃 𝑋 > 𝑇𝐶 < 𝐶 𝐶 → 𝐹𝑋 𝑇𝐶 > 1 − 𝐶 𝐶
• Profile tasks to collect PMC
values
• Define 3 operating areas:
• safe, warning, critical
• Respective thresholds TW and TC
are based on confidence levels
(CW and CC)
Cumulative Distribution Function
(CDF) of a task execution time (in
clock cycles)
SAFETY TECHNIQUE
Finding the correct dose of poison for PMCs
Off-line phase: PMCs profiling
𝑃 𝑋 > 𝑇 𝑊 < 𝐶 𝑊 → 𝐹𝑋 𝑇 𝑊 > 1 − 𝐶 𝑊
𝑃 𝑋 > 𝑇𝐶 < 𝐶 𝐶 → 𝐹𝑋 𝑇𝐶 > 1 − 𝐶 𝐶
• Profile tasks to collect PMC
values
• Define 3 operating areas:
• safe, warning, critical
• Respective thresholds TW and TC
are based on confidence levels
(CW and CC)
Safe Area
SAFETY TECHNIQUE
Finding the correct dose of poison for PMCs
Off-line phase: PMCs profiling
𝑃 𝑋 > 𝑇 𝑊 < 𝐶 𝑊 → 𝐹𝑋 𝑇 𝑊 > 1 − 𝐶 𝑊
𝑃 𝑋 > 𝑇𝐶 < 𝐶 𝐶 → 𝐹𝑋 𝑇𝐶 > 1 − 𝐶 𝐶
• Profile tasks to collect PMC
values
• Define 3 operating areas:
• safe, warning, critical
• Respective thresholds TW and TC
are based on confidence levels
(CW and CC)
Warning Area
SAFETY TECHNIQUE
Finding the correct dose of poison for PMCs
Critical
Area
Warning Area
Safe
Area
On-line phase: PMCs monitoring
SAFETY TECHNIQUE
Finding the correct dose of poison for PMCs
Ok
Critical
Area
Warning Area
Safe
Area
On-line phase: PMCs monitoring
Erra-consecutive
warnings?
CPS ARCHITECTURE
The nodes
Monitor
Node
0
…
Node
N
Tasks
Safety
tasks
Malicious
task
Service
s
Encryption
Service
PMC
Service
Performanc
e Monitor
Counters
K
E
Y
Applications
Operating
System
Hardware
Sensors &
Actuators

Weitere ähnliche Inhalte

Was ist angesagt?

Piyush_Kant_Singh_updated_resume
Piyush_Kant_Singh_updated_resumePiyush_Kant_Singh_updated_resume
Piyush_Kant_Singh_updated_resume
PIYUSH SINGH
 
BlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALBlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINAL
Marina Krotofil
 
Understanding fire and gas mapping software
Understanding fire and gas mapping softwareUnderstanding fire and gas mapping software
Understanding fire and gas mapping software
Kenexis
 
DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_Larsen
Marina Krotofil
 

Was ist angesagt? (11)

Piyush_Kant_Singh_updated_resume
Piyush_Kant_Singh_updated_resumePiyush_Kant_Singh_updated_resume
Piyush_Kant_Singh_updated_resume
 
Understanding Safety Level Integrity Levels (SIL)
Understanding Safety Level Integrity Levels (SIL)Understanding Safety Level Integrity Levels (SIL)
Understanding Safety Level Integrity Levels (SIL)
 
BlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALBlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINAL
 
2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems2011-05-02 - VU Amsterdam - Testing safety critical systems
2011-05-02 - VU Amsterdam - Testing safety critical systems
 
Safety system
Safety systemSafety system
Safety system
 
Understanding fire and gas mapping software
Understanding fire and gas mapping softwareUnderstanding fire and gas mapping software
Understanding fire and gas mapping software
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
MKAD_black_V2
MKAD_black_V2MKAD_black_V2
MKAD_black_V2
 
Risk Based Inspection
Risk Based InspectionRisk Based Inspection
Risk Based Inspection
 
DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_Larsen
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control Systems
 

Ähnlich wie Shielding Performance Monitor Counters: a double edge weapon for safety and security

Risk Based Design &amp; SCE
Risk Based Design &amp; SCERisk Based Design &amp; SCE
Risk Based Design &amp; SCE
adepp
 
ADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based DesignADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based Design
Fabienne Salimi
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 

Ähnlich wie Shielding Performance Monitor Counters: a double edge weapon for safety and security (20)

Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Risk Based Design &amp; SCE
Risk Based Design &amp; SCERisk Based Design &amp; SCE
Risk Based Design &amp; SCE
 
ADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based DesignADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based Design
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
 
webinar-level-up-your-cloud-security.pdf
webinar-level-up-your-cloud-security.pdfwebinar-level-up-your-cloud-security.pdf
webinar-level-up-your-cloud-security.pdf
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
 
Cybersecurity Assessment of Communication-Based Train Control systems
Cybersecurity Assessment of Communication-Based Train Control systemsCybersecurity Assessment of Communication-Based Train Control systems
Cybersecurity Assessment of Communication-Based Train Control systems
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
 
Eu 2016 114 - 8
Eu 2016 114 - 8Eu 2016 114 - 8
Eu 2016 114 - 8
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
 
First SCADA LAB International Workshop
First SCADA LAB International WorkshopFirst SCADA LAB International Workshop
First SCADA LAB International Workshop
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
Profile tulasi v1.1
Profile tulasi v1.1Profile tulasi v1.1
Profile tulasi v1.1
 
Software Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptxSoftware Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptx
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
 
Conceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptxConceptual model for security in next generation network.pptx
Conceptual model for security in next generation network.pptx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 

Kürzlich hochgeladen

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 

Kürzlich hochgeladen (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 

Shielding Performance Monitor Counters: a double edge weapon for safety and security

  • 1. Shielding Performance Monitor Counters: a double edge weapon for safety and security A. Carelli, A. Vallero and S. Di Carlo 24th IEEE International Symposium on On-Line Testing and Robust System Design Hotel Cap Roig, Platja d’Aro, Costa Brava, Spain, July 2-4, 2018
  • 2. • The application of Cyber Physical Systems (CPSs) is becoming pervasive, even for critical structures • Safety and security must be taken into account to prevent misbehavior leading to catastrophic consequences. • In modern microprocessors the usage of Performance Monitor Counters (PMCs): ✚ helps to detect timing violations and other physical failure ⁃ Can be exploited to perform attack compromising security MOTIVATIONS What is the relation between safety and security of Cyber Physical Systems?
  • 3. • The application of Cyber Physical Systems (CPSs) is becoming pervasive, even for critical structures • Safety and security must be taken into account to prevent misbehavior leading to catastrophic consequences. • In modern microprocessors the usage of Performance Monitor Counters (PMCs): ✚ helps to detect timing violations and other physical failure ⁃ Can be exploited to perform attack compromising security MOTIVATIONS What is the relation between safety and security of Cyber Physical Systems?We want to protect PMC from security attacks without compromising safety
  • 6. CPS ARCHITECTURE The nodes Node N Tasks Service s Encryption Service PMC Service Performanc e Monitor Counters K E Y Applications Operating System uProcessor Monitor Node 0 … Sensors & Actuators
  • 7. CPS ARCHITECTURE The nodes Tasks Service s Encryption Service PMC Service Performanc e Monitor Counters K E Y Applications Operating System uProcessor Safety tasks Sensors & Actuators Node N Monitor Node 0 …
  • 8. CPS ARCHITECTURE Safety task Safety tasks PMC Service Performanc e Monitor Counters Applications Operating System uProcessor 1) Off-line phase: PMCs profiling 2) On-line phase: PMCs monitoring Safety is guaranteed through PMCs as proposed in [S.Esposito et al., ACM-TECS, 2017]
  • 9. SAFETY TECHNIQUE Detecting deadline misses Off-line phase: PMCs profiling Cumulative Distribution Function (CDF) of the execution time of an application What is the probability the execution time of the application is lower than t? • Profile each application to collect PMC values related to their execution time
  • 10. SAFETY TECHNIQUE Detecting deadline misses Off-line phase: PMCs profiling Cumulative Distribution Function (CDF) of the execution time of an application • Profile each application to collect PMC values related to their execution time • Define 2 thresholds related to the CDF in order to decide when the execution of an application is safe or critical
  • 11. • Profile each application to collect PMC values related to their execution time • Define 2 thresholds related to the CDF in order to decide when the execution of an application is safe or critical SAFETY TECHNIQUE Detecting deadline misses Off-line phase: PMCs profiling Cumulative Distribution Function (CDF) of the execution time of an application Warning Threshold - WTH Critical Threshold - CTH 𝑃 𝑋 > 𝑊𝑇𝐻 < 𝐶 𝑊 → 𝐹𝑋 𝑊𝑇𝐻 > 1 − 𝐶 𝑊 𝑃 𝑋 > 𝐶 𝑇𝐻 < 𝐶 𝐶 → 𝐹𝑋 𝐶 𝑇𝐻 > 1 − 𝐶 𝐶 WTH CW CC CTH
  • 12. SAFETY TECHNIQUE Detecting deadline misses • Profile each application to collect PMC values related to their execution time • Define 2 thresholds related to the CDF in order to decide when the execution of an application is safe or critical • Decide if the execution of an application is critical or not critical Cumulative Distribution Function (CDF) of the execution time of an application On-line phase: PMCs monitoring CTH
  • 13. SAFETY TECHNIQUE Detecting deadline misses • Profile each application to collect PMC values related to their execution time • Define 2 thresholds related to the CDF in order to decide when the execution of an application is safe or critical • Decide if the execution of an application is critical or not critical Cumulative Distribution Function (CDF) of the execution time of an application When the execution time of an application exceeds CTH is classified as critical Critical AreaOn-line phase: PMCs monitoring
  • 14. SAFETY TECHNIQUE Detecting deadline misses • Profile each application to collect PMC values related to their execution time • Define 2 thresholds related to the CDF in order to decide when the execution of an application is safe or critical • Decide if the execution of an application is critical or not critical • Decide if the execution of an application is safe or potentially critical Cumulative Distribution Function (CDF) of the execution time of an application On-line phase: PMCs monitoring WTH
  • 15. • Profile each application to collect PMC values related to their execution time • Define 2 thresholds related to the CDF in order to decide when the execution of an application is safe or critical • Decide if the execution of an application is critical or not critical • Decide if the execution of an application is safe or potentially critical SAFETY TECHNIQUE Detecting deadline misses Cumulative Distribution Function (CDF) of the execution time of an application Safe Area When the execution time of an application is lower than WTH is classified as safe On-line phase: PMCs monitoring
  • 16. SAFETY TECHNIQUE Detecting deadline misses • Profile each application to collect PMC values related to their execution time • Define 2 thresholds related to the CDF in order to decide when the execution of an application is safe or critical • Decide if the execution of an application is critical or not critical • Decide if the execution of an application is safe or potentially critical Cumulative Distribution Function (CDF) of the execution time of an application Warning AreaWhen the execution time of an application is between WTH and CTH is classfied as potentially critical On-line phase: PMCs monitoring
  • 17. On-line phase: PMCs monitoring SAFETY TECHNIQUE Detecting deadline misses • Profile each application to collect PMC values related to their execution time • Define 2 thresholds related to the CDF in order to decide when the execution of an application is safe or critical • Decide if the execution of an application is critical or not critical • Decide if the execution of an application is safe or potentially critical Cumulative Distribution Function (CDF) of the execution time of an application Warning Area If the application is classified as potentially critical for α-times consecutively, the application is classified as critical
  • 18. CPS ARCHITECTURE Attack Model Tasks Safety tasks Maliciou s task Service s Encryption Service PMC Service Performanc e Monitor Counters K E Y Applications Operating System uProcessor Side-channel attack based on PMCs [Bonneau et al., CHES, 2006] • Target: AES encryption key • Exploits the data locality of the final round S-box in cache memories • Evolves a guessed key according to encryption time and ciphertext We assume that the attacker can • inject malicious tasks in a node • probe PMCs and trigger the encryption process
  • 19. ATTACK MITIGATION Finding the correct dose of poison for PMCs Service s Encryption Service PMC Service Performanc e Monitor Counters K E Y Operating System uProcessor Solution: Poison the values of PMCs to neutralize the attack
  • 20. ATTACK MITIGATION Finding the correct dose of poison for PMCs Service s Encryption Service PMC Service Performanc e Monitor Counters K E Y Operating System uProcessor Solution: Poison the values of PMCs to neutralize the attack The safety task will be affected by the poisoning too, thus it might fail!
  • 21. ATTACK MITIGATION Finding the correct dose of poison for PMCs Service s Encryption Service PMC Service Performanc e Monitor Counters K E Y Operating System uProcessor Solution: Poison the values of PMCs to neutralize the attack What’s your poison??? • Fixed value alteration • Random value alteration
  • 22. ATTACK MITIGATION Finding the correct dose of poison for PMCs On-line phase: PMCs monitoring Both Safety task and malicious task monitor PMCs. As countermeasure for the attack, the PMC value is altered 𝑃𝑀𝐶 = 𝑃𝑀𝐶 + 𝑐 Tasks Safety tasks Maliciou s task Service s Encryption Service PMC Service Performance Monitor Counters K E Y Applications Operating System uProcessor 𝑐 = 𝑈(0, 𝑠 × (𝑊𝑇𝐻 − 𝜇)/2) • s is a scaling factor • µ is the average of PMC value
  • 23. uProcessor ATTACK MITIGATION Finding the correct dose of poison for PMCs On-line phase: PMCs monitoring Both Safety task and malicious task monitor PMCs. As countermeasure for the attack, the PMC value is altered 𝑃𝑀𝐶 = 𝑃𝑀𝐶 + 𝑐 Tasks Safety tasks Maliciou s task Service s Encryption Service PMC Service Performance Monitor Counters K E Y Applications Operating System 𝑐 = 𝑈(0, 𝑠 × (𝑊𝑇𝐻 − 𝜇)/2) • s is a scaling factor • µ is the average of PMC value WTHµ CTH
  • 24. uProcessor ATTACK MITIGATION Finding the correct dose of poison for PMCs On-line phase: PMCs monitoring Both Safety task and malicious task monitor PMCs. As countermeasure for the attack, the PMC value is altered 𝑃𝑀𝐶 = 𝑃𝑀𝐶 + 𝑐 Tasks Safety tasks Maliciou s task Service s Encryption Service PMC Service Performance Monitor Counters K E Y Applications Operating System 𝑐 = 𝑈(0, 𝑠 × (𝑊𝑇𝐻 − 𝜇)/2) • s is a scaling factor • µ is the average of PMC value WTHµ CTH
  • 25. EXPERIMENTAL RESULTS Experimental Setup • Experiments are conduced on a Slave node • It runs 7 applications: ⁃ MiBench [*] benchmarks used: cjpeg, djpeg, fft, qsort, susan smoothing, susan edges and susan corners • Linux-like Operating System, with additional modules implemented: ⁃ PMC reading service ⁃ encryption service (AES algorithm) • PMC considered: Clock Cycle Counter (on Intel Core i7 Q720 @1.6 GHz) • 100 K samples, repeated 1,000 times for each application • CW = 5% and CC = 0.6% [*] M.R. Guthaus et al., IEEE-WWC-4, 2001
  • 26. EXPERIMENTAL RESULTS Experimental Setup • Experiments are conduced on a Slave node • It runs 7 applications: ⁃ MiBench [*] benchmarks used: cjpeg, djpeg, fft, qsort, susan smoothing, susan edges and susan corners • Linux-like Operating System, with additional modules implemented: ⁃ PMC reading service ⁃ encryption service (AES algorithm) • PMC considered: Clock Cycle Counter (on Intel Core i7 Q720 @1.6 GHz) • 100 K samples, repeated 1,000 times for each application • CW = 5% and CC = 0.6% [*] M.R. Guthaus et al., IEEE-WWC-4, 2001 Cumulative Distribution Function (CDF) of the execution time of an application WTH CW CC CTH
  • 27. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 and α=3 Task (%) misclassified as critical 0 0.0005 0.001 0.0015 0.002 0.0025 0.003 0.0035 0.004 0.0045 0.005 enc fft cjpeg djpeg qsort corn edges smooth avg s-0.2
  • 28. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 and α=3 Task (%) misclassified as critical 0 0.002 0.004 0.006 0.008 0.01 0.012 enc fft cjpeg djpeg qsort corn edges smooth avg s-0.4 s-0.2
  • 29. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 and α=3 Task (%) misclassified as critical 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 enc fft cjpeg djpeg qsort corn edges smooth avg s-0.6 s-0.4 s-0.2
  • 30. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 and α=3 Task (%) misclassified as critical 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 enc fft cjpeg djpeg qsort corn edges smooth avg s-0.8 s-0.6 s-0.4 s-0.2
  • 31. 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 enc fft cjpeg djpeg qsort corn edges smooth avg s-0.8 s-0.6 s-0.4 s-0.2 EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 and α=3 Task (%) misclassified as critical Increasing values of scaling factor s the percentage of misclassified executions increases
  • 32. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 and α=3 Percentage of samples misclassified as critical -0.002 0 0.002 0.004 0.006 0.008 0.01 0.012 Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err enc fft cjpeg djpeg qsort corn edges smooth avg s-0.8 s-0.6 s-0.4 s-0.2
  • 33. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 and α=3 Percentage of samples misclassified as critical -0.002 0 0.002 0.004 0.006 0.008 0.01 0.012 Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err Wrn Err enc fft cjpeg djpeg qsort corn edges smooth avg s-0.8 s-0.6 s-0.4 s-0.2 The increase of Err and WrnToErr depends on the CDF of each benchmark
  • 34. EXPERIMENTAL RESULTS s = 0.5 and ranging the a-factor from 2 to 5 Recovery actions: False positives Vs. Correct detections a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 enc fft cjpeg djpeg qsort corn edges smooth avg 0.00% 0.50% 1.00% 1.50% 2.00% 2.50% 3.00% 3.50% Critical
  • 35. EXPERIMENTAL RESULTS s = 0.5 and ranging the a-factor from 2 to 5 Recovery actions: False positives Vs. Correct detections a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 a-3 a-2-s-0.5 a-3-s-0.5 a-4-s-0.5 a-5-s-0.5 enc fft cjpeg djpeg qsort corn edges smooth avg 0.00% 0.50% 1.00% 1.50% 2.00% 2.50% 3.00% 3.50% Critical In some cases, a- factor reduces the number of false positives
  • 36. EXPERIMENTAL RESULTS Security perspective 65 163 204 SAMPLES (MILION) SAMPLES NEEDED TO RECOVER THE KEY No protection s=0.2 s=0.4 ~2.5x ~3.1x
  • 37. • We presented the interplay between safety and security aspects in the design of a CPS • The PMCs play a double role: ⁃ on the one hand they are employed for a safety mechanism ⁃ on the other hand, they can be exploited as a security vulnerability • We proposed an attack mitigation strategy • Further on-going work is underway to extend case study CONCLUSIONS Final remarks
  • 40. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 Task (%) classified as safe, with and without corruption a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 enc fft cjpeg djpeg qsort corn edges smooth avg 96.5% 97.0% 97.5% 98.0% 98.5% 99.0% 99.5%
  • 41. EXPERIMENTAL RESULTS Task (%) classified as safe, with and without corruption a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 enc fft cjpeg djpeg qsort corn edges smooth avg 96.5% 97.0% 97.5% 98.0% 98.5% 99.0% 99.5% Scaling factor s ranging from 0.2 to 0.8 Task (%) classified as safe, with and without corruption Increasing values of scaling factor s underestimate the percentage of safe classification
  • 42. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 Percentage of samples not directly classified as safe a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 enc fft cjpeg djpeg qsort corn edges smooth avg 0% 1% 2% 3% 4% 5% 6% 7% 8% 9% WrnToOk WrnToErr Err
  • 43. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 Percentage of samples not directly classified as safe a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 enc fft cjpeg djpeg qsort corn edges smooth avg 0% 1% 2% 3% 4% 5% 6% 7% 8% 9% WrnToOk WrnToErr Err The increase of s translates into an increase of warnings, however the a-factor mitigates the increase of Err
  • 44. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 Percentage of samples classified as critical a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 enc fft cjpeg djpeg qsort corn edges smooth avg 0.0% 0.5% 1.0% 1.5% 2.0% 2.5% 3.0% WrnToErr Err
  • 45. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 Percentage of samples classified as critical a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 enc fft cjpeg djpeg qsort corn edges smooth avg 0.0% 0.5% 1.0% 1.5% 2.0% 2.5% 3.0% WrnToErr Err The increase of Err and WrnToErr depends on the CDF of each benchmark
  • 46. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 Recovery actions: False positives Vs. Correct detections a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 enc fft cjpeg djpeg qsort corn edges smooth avg 0% 20% 40% 60% 80% 100% 120% 140% 160%
  • 47. EXPERIMENTAL RESULTS Scaling factor s ranging from 0.2 to 0.8 Recovery actions: False positives Vs. Correct detections a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 a-3 a-3-s0.2 a-3-s0.4 a-3-s0.6 a-3-s0.8 enc fft cjpeg djpeg qsort corn edges smooth avg 0% 20% 40% 60% 80% 100% 120% 140% 160% The increase of s translates into an increase of false positives
  • 48. •Without PMC protection: attack successful in 65M samples •With PMC protection: ⁃Attack successful after 163M (~2.5x) of samples (s=0.2) ⁃Attack successful after 204M (~3.1x) of samples (s=0.4) EXPERIMENTAL RESULTS Security perspective
  • 49. •Without PMC protection: attack successful in 65M samples •With PMC protection: ⁃Attack successful after 163M (~2.5x) of samples (s=0.2) ⁃Attack successful after 204M (~3.1x) of samples (s=0.4) EXPERIMENTAL RESULTS Security perspective Best conditions for the attacker! (lowest corruption value)
  • 50. SAFETY TECHNIQUE Finding the correct dose of poison for PMCs Off-line phase: PMCs profiling • Profile tasks to collect PMC values related to the execution time Time Profile for a Task ExecutionTime (ClockCycles) Iteration Time Profile for a Task
  • 51. SAFETY TECHNIQUE Finding the correct dose of poison for PMCs Off-line phase: PMCs profiling 𝑃 𝑋 > 𝑇 𝑊 < 𝐶 𝑊 → 𝐹𝑋 𝑇 𝑊 > 1 − 𝐶 𝑊 𝑃 𝑋 > 𝑇𝐶 < 𝐶 𝐶 → 𝐹𝑋 𝑇𝐶 > 1 − 𝐶 𝐶 • Profile tasks to collect PMC values • Define 3 operating areas: • safe, warning, critical • Respective thresholds TW and TC are based on confidence levels (CW and CC) Critical Area
  • 52. SAFETY TECHNIQUE Finding the correct dose of poison for PMCs Off-line phase: PMCs profiling 𝑃 𝑋 > 𝑇 𝑊 < 𝐶 𝑊 → 𝐹𝑋 𝑇 𝑊 > 1 − 𝐶 𝑊 𝑃 𝑋 > 𝑇𝐶 < 𝐶 𝐶 → 𝐹𝑋 𝑇𝐶 > 1 − 𝐶 𝐶 • Profile tasks to collect PMC values • Define 3 operating areas: • safe, warning, critical • Respective thresholds TW and TC are based on confidence levels (CW and CC) Cumulative Distribution Function (CDF) of a task execution time (in clock cycles)
  • 53. SAFETY TECHNIQUE Finding the correct dose of poison for PMCs Off-line phase: PMCs profiling 𝑃 𝑋 > 𝑇 𝑊 < 𝐶 𝑊 → 𝐹𝑋 𝑇 𝑊 > 1 − 𝐶 𝑊 𝑃 𝑋 > 𝑇𝐶 < 𝐶 𝐶 → 𝐹𝑋 𝑇𝐶 > 1 − 𝐶 𝐶 • Profile tasks to collect PMC values • Define 3 operating areas: • safe, warning, critical • Respective thresholds TW and TC are based on confidence levels (CW and CC) Safe Area
  • 54. SAFETY TECHNIQUE Finding the correct dose of poison for PMCs Off-line phase: PMCs profiling 𝑃 𝑋 > 𝑇 𝑊 < 𝐶 𝑊 → 𝐹𝑋 𝑇 𝑊 > 1 − 𝐶 𝑊 𝑃 𝑋 > 𝑇𝐶 < 𝐶 𝐶 → 𝐹𝑋 𝑇𝐶 > 1 − 𝐶 𝐶 • Profile tasks to collect PMC values • Define 3 operating areas: • safe, warning, critical • Respective thresholds TW and TC are based on confidence levels (CW and CC) Warning Area
  • 55. SAFETY TECHNIQUE Finding the correct dose of poison for PMCs Critical Area Warning Area Safe Area On-line phase: PMCs monitoring
  • 56. SAFETY TECHNIQUE Finding the correct dose of poison for PMCs Ok Critical Area Warning Area Safe Area On-line phase: PMCs monitoring Erra-consecutive warnings?

Hinweis der Redaktion

  1. Which discuss the mutual interaction of 2 design aspects which are safety and sec [when designing a sys]
  2. CPS are becoming m&m pervasive and find appl in CI, where Saf&Sec are 2 mandatory aspects to consider Safety & sec must be considered together bcs safety techn might negatively affect sec of the system e viceversa. To demonstrate this, we know there are a certain no of safety techn based on PC, however the PC are a src of SCA
  3. In our work, we show a possible way to safely & securely use PCs, mitigating possible attacks
  4. Introduce showing the saf&sec mech, detail our proposed solution Present results
  5. We consider a distributed system architecture because it is used in most CPS
  6. In our work we focus on the node Node is uP-based system, with an OS, running applications for the node OS offers Enc srv, bcs sec comm of data xchanged OS offers PMC srv, bcs as I’ll show, they will be used for safety mechn [Indeed, nodes might fail, so it is necessary to guarantee safety -> add tasks]
  7. Indeed, nodes might fail, so it is necessary to guarantee safety -> add safety mech as safety tasks
  8. I nodi must meet deadlines, quindi il safety task controlla che le deadline siano rispettate
  9. In the offline phase, every app is profiled to collect its exec time Given the collected data, webuilt the cdf chart which tells
  10. These 2 th are defined as W e C, and have associate a respective confidence level
  11. During the online phase the application are monitored and their exec time is …
  12. Sostituire «What’s your poison» con «How?» o «How much?» «neutralize»: non dimostriamo di neutralizzare l’attacco. Semplicemente ritardiamo la scoperta della chiave