Abstract

In this paper, we introduce a memory and cache contention denial-of-service attack and its hardware-based countermeasure. Our attack can significantly degrade the performance of the benign programs by hindering the shared resource accesses of the benign programs. It can be achieved by a simple C-based malicious code while degrading the performance of the benign programs by 47.6% on average. As another side-effect, our attack also leads to greater energy consumption of the system by 2.1× on average, which may cause shorter battery life in the mobile edge devices. We also propose detection and mitigation techniques for thwarting our attack. By analyzing L1 data cache miss request patterns, we effectively detect the malicious program for the memory and cache contention denial-of-service attack. For mitigation, we propose using instruction fetch width throttling techniques to restrict the malicious accesses to the shared resources. When employing our malicious program detection with the instruction fetch width throttling technique, we recover the system performance and energy by 92.4% and 94.7%, respectively, which means that the adverse impacts from the malicious programs are almost removed.

Highlights

  • We provide energy results, as our memory and cache contention denial-of-service attack leads to huge energy consumption in mobile systems and shows how our countermeasure effectively reduces the energy consumed by the malicious program

  • We introduce memory and cache contention attack, which causes denialof-service (DoS) and exhaustive energy consumption in mobile edge devices

  • By utilizing the differences between the workload characteristics of normal and malicious program, our proposed detection technique successfully detects the malicious program for the memory and cache contention DoS attack with near-zero false alarm rates

Read more

Summary

Introduction

Computing systems are ubiquitous and pervasive. mobile computing systems account for a large portion of the computing systems in the realworld. DoS attacks may result in huge energy consumption because the malicious code delays the execution of the normal programs (it increases the static power consumption of the system), but it consumes non-negligible energy by itself This in turn leads to faster battery exhaustion in mobile systems, deteriorating user experiences. We provide energy results, as our memory and cache contention denial-of-service attack leads to huge energy consumption in mobile systems and shows how our countermeasure effectively reduces the energy consumed by the malicious program. We introduce memory and cache contention denial-of-service attack and demonstrate how this attack threatens mobile edge computing systems in terms of both performance and energy;.

Related Work
System Assumptions
Hardware-Based Countermeasures for Memory and Cache Contention DoS Attack
Our Proposed Detection Method
Performance
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.