On the thermal attack in instruction caches

Joonho Kong, Johnsy K. John, Eui Young Chung, Sung Woo Jung, Jie Hu

Research output: Contribution to journalArticle

12 Citations (Scopus)

Abstract

The instruction cache has been recognized as one of the least hot units in microprocessors, which leaves the instruction cache largely ignored in on-chip thermal management. Consequently, thermal sensors are not allocated near the instruction cache. However, malicious codes can exploit the deficiency in this empirical design and heat up fine-grain localized hotspots in the instruction cache, which might lead to physical damages. In this paper, we show how instruction caches can be thermally attacked by malicious codes and how simple techniques can be utilized to protect instruction caches from the thermal attack.

Original languageEnglish
Article number5465864
Pages (from-to)217-223
Number of pages7
JournalIEEE Transactions on Dependable and Secure Computing
Volume7
Issue number2
DOIs
Publication statusPublished - 2010 May 31

Fingerprint

Temperature control
Microprocessor chips
Sensors
Hot Temperature

Keywords

  • Cache memories
  • Fine-grain localized hotspot
  • Malicious codes
  • Microprocessors
  • Thermal attack

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

On the thermal attack in instruction caches. / Kong, Joonho; John, Johnsy K.; Chung, Eui Young; Jung, Sung Woo; Hu, Jie.

In: IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 2, 5465864, 31.05.2010, p. 217-223.

Research output: Contribution to journalArticle

Kong, Joonho ; John, Johnsy K. ; Chung, Eui Young ; Jung, Sung Woo ; Hu, Jie. / On the thermal attack in instruction caches. In: IEEE Transactions on Dependable and Secure Computing. 2010 ; Vol. 7, No. 2. pp. 217-223.
@article{8ff9358b3307441997ea7cd89c6dc5c7,
title = "On the thermal attack in instruction caches",
abstract = "The instruction cache has been recognized as one of the least hot units in microprocessors, which leaves the instruction cache largely ignored in on-chip thermal management. Consequently, thermal sensors are not allocated near the instruction cache. However, malicious codes can exploit the deficiency in this empirical design and heat up fine-grain localized hotspots in the instruction cache, which might lead to physical damages. In this paper, we show how instruction caches can be thermally attacked by malicious codes and how simple techniques can be utilized to protect instruction caches from the thermal attack.",
keywords = "Cache memories, Fine-grain localized hotspot, Malicious codes, Microprocessors, Thermal attack",
author = "Joonho Kong and John, {Johnsy K.} and Chung, {Eui Young} and Jung, {Sung Woo} and Jie Hu",
year = "2010",
month = "5",
day = "31",
doi = "10.1109/TDSC.2009.16",
language = "English",
volume = "7",
pages = "217--223",
journal = "IEEE Transactions on Dependable and Secure Computing",
issn = "1545-5971",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

TY - JOUR

T1 - On the thermal attack in instruction caches

AU - Kong, Joonho

AU - John, Johnsy K.

AU - Chung, Eui Young

AU - Jung, Sung Woo

AU - Hu, Jie

PY - 2010/5/31

Y1 - 2010/5/31

N2 - The instruction cache has been recognized as one of the least hot units in microprocessors, which leaves the instruction cache largely ignored in on-chip thermal management. Consequently, thermal sensors are not allocated near the instruction cache. However, malicious codes can exploit the deficiency in this empirical design and heat up fine-grain localized hotspots in the instruction cache, which might lead to physical damages. In this paper, we show how instruction caches can be thermally attacked by malicious codes and how simple techniques can be utilized to protect instruction caches from the thermal attack.

AB - The instruction cache has been recognized as one of the least hot units in microprocessors, which leaves the instruction cache largely ignored in on-chip thermal management. Consequently, thermal sensors are not allocated near the instruction cache. However, malicious codes can exploit the deficiency in this empirical design and heat up fine-grain localized hotspots in the instruction cache, which might lead to physical damages. In this paper, we show how instruction caches can be thermally attacked by malicious codes and how simple techniques can be utilized to protect instruction caches from the thermal attack.

KW - Cache memories

KW - Fine-grain localized hotspot

KW - Malicious codes

KW - Microprocessors

KW - Thermal attack

UR - http://www.scopus.com/inward/record.url?scp=77952697108&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77952697108&partnerID=8YFLogxK

U2 - 10.1109/TDSC.2009.16

DO - 10.1109/TDSC.2009.16

M3 - Article

AN - SCOPUS:77952697108

VL - 7

SP - 217

EP - 223

JO - IEEE Transactions on Dependable and Secure Computing

JF - IEEE Transactions on Dependable and Secure Computing

SN - 1545-5971

IS - 2

M1 - 5465864

ER -