@inproceedings{816a1c4a4b524801b0d0dc9d0e814a11,
title = "Exploiting CPU Clock Modulation for Covert Communication Channel",
abstract = "Covert channel attacks represent a significant threat to system security, leveraging shared resources to clandestinely transmit information from highly secure systems, thereby violating the system's security policies. These attacks exploit shared resources as communication channels, necessitating resource partitioningand isolation techniques as countermeasures. However, mitigating attacks exploiting modern processors' hardware features to leak information is challenging because successful attacks can conceal the channel's existence. In this paper, we unveil a novel covert channel exploiting the duty cycle modulation feature of modern x86 processors. Specifically, we illustrate how two collaborating processesa sender and a receiver can manipulate this feature to transmit sensitive information surrep-titiously. Our live system implementation demonstrates that this covert channel can achieve a data transfer rate of up to 55.24 bits per second.",
keywords = "Clock Modulation, Covert Channel, Model Specific Register",
author = "Shariful Alam and Jidong Xiao and Eisty, {Nasir U.}",
note = "Publisher Copyright: {\textcopyright} 2024 IEEE.; 22nd IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2024 ; Conference date: 30-05-2024 Through 01-06-2024",
year = "2024",
doi = "10.1109/SERA61261.2024.10685636",
language = "English",
series = "2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications, SERA 2024 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "153--158",
editor = "Teruhisa Hochin and Jixin Ma and Osamu Mizuno",
booktitle = "2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications, SERA 2024 - Proceedings",
}