Exploiting CPU Clock Modulation for Covert Communication Channel

Shariful Alam, Jidong Xiao, Nasir U. Eisty

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Covert channel attacks represent a significant threat to system security, leveraging shared resources to clandestinely transmit information from highly secure systems, thereby violating the system's security policies. These attacks exploit shared resources as communication channels, necessitating resource partitioningand isolation techniques as countermeasures. However, mitigating attacks exploiting modern processors' hardware features to leak information is challenging because successful attacks can conceal the channel's existence. In this paper, we unveil a novel covert channel exploiting the duty cycle modulation feature of modern x86 processors. Specifically, we illustrate how two collaborating processesa sender and a receiver can manipulate this feature to transmit sensitive information surrep-titiously. Our live system implementation demonstrates that this covert channel can achieve a data transfer rate of up to 55.24 bits per second.

Original languageEnglish
Title of host publication2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications, SERA 2024 - Proceedings
EditorsTeruhisa Hochin, Jixin Ma, Osamu Mizuno
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages153-158
Number of pages6
ISBN (Electronic)9798350391343
DOIs
StatePublished - 2024
Event22nd IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2024 - Honolulu, United States
Duration: 30 May 20241 Jun 2024

Publication series

Name2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications, SERA 2024 - Proceedings

Conference

Conference22nd IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2024
Country/TerritoryUnited States
CityHonolulu
Period30/05/241/06/24

Keywords

  • Clock Modulation
  • Covert Channel
  • Model Specific Register

Fingerprint

Dive into the research topics of 'Exploiting CPU Clock Modulation for Covert Communication Channel'. Together they form a unique fingerprint.

Cite this