Affiliation:
1. Department of Electrical and Computer Engineering, Stony Brook University, Stony Brook, NY 11794, USA
Abstract
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between two entities that are not authorized to share data. The secret data is encoded into different forms of signals, such as delay, temperature, or hard drive location. These signals and information are then decoded by the receiver to retrieve the secret data, thereby mitigating some of the existing security measures. The important steps of covert channel attacks are described, such as data encoding, communication protocol, data decoding, and models to estimate communication bandwidth and bit error rate. Countermeasures against covert channels and existing covert channel detection techniques are also summarized. In the second part of the paper, the implications of such attacks for emerging packaging technologies, such as 2.5D/3D integration are discussed. Several covert channel threat models for 2.5D/3D ICs are also proposed.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference104 articles.
1. (2022, December 20). ARM TrustZone. Available online: https://developer.arm.com/ip-products/security-ip/trustzone.
2. Ngabonziza, B., Martin, D., Bailey, A., Cho, H., and Martin, S. (2016, January 1–3). Trustzone explained: Architectural features and use cases. Proceedings of the 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, USA.
3. McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C.V., Shafi, H., Shanbhogue, V., and Savagaonkar, U.R. (2013). Innovative instructions and software model for isolated execution. Hasp@ isca, 10.
4. A study of security isolation techniques;Shu;ACM Comput. Surv. (CSUR),2016
5. Carrara, B., and Adams, C. (2016, January 20–22). A survey and taxonomy aimed at the detection and measurement of covert channels. Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, Vigo, Spain.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. HydraulicBridge: Covert Signaling Channel between Air-Gapped Systems Using Hydraulic-Pressure Fluctuations;Electronics;2024-07-30
2. Enhanced Detection of Thermal Covert Channel Attacks in Multicore Processors;2024 25th International Symposium on Quality Electronic Design (ISQED);2024-04-03
3. Network Covert channels;Steganography - The Art of Hiding Information [Working Title];2024-04-03
4. Covert Communication Attacks in Chiplet-based 2.5-D Integration Systems;2023 IEEE 36th International System-on-Chip Conference (SOCC);2023-09-05
5. Information-Theoretic Perspective to Thermal Covert Channels;2023 IEEE International Symposium on Circuits and Systems (ISCAS);2023-05-21