Affiliation:
1. The University of Texas at Dallas, United States
2. New York University, United States
Abstract
Micro-architectural footprints can be used to distinguish one application from another. Most modern processors feature hardware performance counters to monitor the various micro-architectural events when an application is executing. These ready-made hardware performance counters can be used to create program fingerprints and have been shown to successfully differentiate between individual applications. In this paper, we demonstrate how ready-made hardware performance counters, due to their coarse-grain nature (low sampling rate and bundling of similar events, e.g., number of instructions instead of number of add instructions), are insufficient to this end. This observation motivates exploration of tailor-made hardware performance counters to capture fine-grain characteristics of the programs. As a case study, we evaluate both ready-made and tailor-made hardware performance counters using post-quantum cryptographic key encapsulation mechanism implementations. Machine learning models trained on tailor-made hardwareperformance counter streams demonstrate that they can uniquely identify the behavior of every post-quantum cryptographic key encapsulation mechanism algorithm with at least 98.99% accuracy.
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference65 articles.
1. Erdem Alkim. 2017. FrodoKEM. https://frodokem.org/. Erdem Alkim. 2017. FrodoKEM. https://frodokem.org/.
2. BIKE: Bit flipping key encapsulation;Nicolas Aragon;NIST Submissions,2017
3. Kanad Basu et al. 2019. NIST post-quantum cryptography-a hardware evaluation study.IACR Cryptol 2019 1 (2019) 47. Kanad Basu et al. 2019. NIST post-quantum cryptography-a hardware evaluation study.IACR Cryptol 2019 1 (2019) 47.
4. A Theoretical Study of Hardware Performance Counters-Based Malware Detection
5. NTRU prime;Bernstein Daniel J;IACR Cryptol,2016
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献