Detail View

BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

DC Field Value Language
dc.contributor.author Kim, Hyosang -
dc.contributor.author Kang, Ki-Dong -
dc.contributor.author Park, Gyeongseo -
dc.contributor.author Lee, Seungkyu -
dc.contributor.author Kim, Daehoon -
dc.date.accessioned 2025-06-12T10:40:13Z -
dc.date.available 2025-06-12T10:40:13Z -
dc.date.created 2025-05-08 -
dc.date.issued 2025-03-03 -
dc.identifier.isbn 9798331506476 -
dc.identifier.issn 2378-203X -
dc.identifier.uri https://scholar.dgist.ac.kr/handle/20.500.11750/58404 -
dc.description.abstract Power and energy consumption emerge as critical aspects in computing systems, spanning from mobile devices to data-center servers. Modern processors typically support idle states (i.e., C-states), which deactivate specific hardware components, in addition to offering multiple voltage and frequency states (i.e., P-states). While C-states can significantly reduce static power when processor cores are idle, a notable security vulnerability arises due to differences in wake-up latency among various C-states when the processor cores become active again. This paper proposes a security vulnerability arising from processor idle state management, called BrokenSleep, which exploits the aforementioned wake-up latency differences to create covert and side-channel between computing nodes connected via an external network. This study presents the first remote timing attack based on power management, overcoming the limitations of previous research that required the co-location of attacker and victim applications on the same local machine. This advancement significantly extends the range of existing remote timing attacks by integrating power-related factors. Regardless of the computing system types, our experiments demonstrate that an attacker can transfer data to remote machines without direct network access and deduce the keystroke timing. This vulnerability is not confined to a single processor architecture; it affects processors designed by both Intel and ARM, indicating a widespread potential risk across different hardware platforms. © 2025 IEEE. -
dc.language English -
dc.publisher IEEE Computer Society -
dc.relation.ispartof Proceedings - International Symposium on High-Performance Computer Architecture -
dc.title BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States -
dc.type Conference Paper -
dc.identifier.doi 10.1109/HPCA61900.2025.00040 -
dc.identifier.scopusid 2-s2.0-105003391840 -
dc.identifier.bibliographicCitation Kim, Hyosang. (2025-03-03). BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States. International Symposium on High-Performance Computer Architecture, 409–422. doi: 10.1109/HPCA61900.2025.00040 -
dc.identifier.url https://hpca-conf.org/2025/main-program/ -
dc.citation.conferenceDate 2025-03-01 -
dc.citation.conferencePlace US -
dc.citation.conferencePlace Las Vegas -
dc.citation.endPage 422 -
dc.citation.startPage 409 -
dc.citation.title International Symposium on High-Performance Computer Architecture -
Show Simple Item Record

File Downloads

  • There are no files associated with this item.

공유

qrcode
공유하기

Total Views & Downloads