Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2749469.2750419acmconferencesArticle/Chapter ViewAbstractPublication PagesiscaConference Proceedingsconference-collections
research-article

Probable cause: the deanonymizing effects of approximate DRAM

Published: 13 June 2015 Publication History

Abstract

Approximate computing research seeks to trade-off the accuracy of computation for increases in performance or reductions in power consumption. The observation driving approximate computing is that many applications tolerate small amounts of error which allows for an opportunistic relaxation of guard bands (e.g., clock rate and voltage). Besides affecting performance and power, reducing guard bands exposes analog properties of traditionally digital components. For DRAM, one analog property exposed by approximation is the variability of memory cell decay times.
In this paper, we show how the differing cell decay times of approximate DRAM creates an error pattern that serves as a system identifying fingerprint. To validate this observation, we build an approximate memory platform and perform experiments that show that the fingerprint due to approximation is device dependent and resilient to changes in environment and level of approximation. To identify a DRAM chip given an approximate output, we develop a distance metric that yields a two-orders-of-magnitude difference in the distance between approximate results produced by the same DRAM chip and those produced by other DRAM chips. We use these results to create a mathematical model of approximate DRAM that we leverage to explore the end-to-end deanonymizing effects of approximate memory using a commodity system running an image manipulation program. The results from our experiment show that given less than 100 approximate outputs, the fingerprint for an approximate DRAM begins to converge to a single, machine identifying fingerprint.

References

[1]
V. Brik, S. Banerjee, M. Gruteser, and S. Oh, "Wireless device identification with radiometric signatures," in Proceedings of the 14th ACM international conference on Mobile computing and networking (Mobi-Com), 2008.
[2]
K. Cumming, "Purposeful data: the roles and purposes of recordkeeping metadata," Records Management Journal, 2007.
[3]
H. David, C. Fallin, E. Gorbatov, U. R. Hanebutte, and O. Mutlu, "Memory power management via dynamic voltage/frequency scaling," in International Conference on Autonomic Computing, ser. ICAC, 2011.
[4]
Q. Deng, D. Meisner, L. Ramos, T. F. Wenisch, and R. Bianchini, "Memscale: active low-power modes for main memory," ACM SIGPLAN Notices, 2011.
[5]
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," DTIC Document, Tech. Rep., 2004.
[6]
H. Esmaeilzadeh, A. Sampson, L. Ceze, and D. Burger, "Architecture support for disciplined approximate programming," in ACM SIGARCH Computer Architecture News, 2012.
[7]
Z. J. Geradts, J. Bijhold, M. Kieft, K. Kurosawa, K. Kuroki, and N. Saitoh, "Methods for identification of images acquired with digital cameras," in Enabling Technologies for Law Enforcement. International Society for Optics and Photonics, 2001.
[8]
G. Greenwald, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, May 2014.
[9]
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten, "Lest we remember: cold-boot attacks on encryption keys," Communications of the ACM, 2009.
[10]
T. Hamamoto, S. Sugiura, and S. Sawada, "On the retention time distribution of dynamic random access memory (DRAM)," IEEE Transactions on Electron Devices, 1998.
[11]
D. Holcomb, W. Burleson, and K. Fu, "Initial SRAM state as a fingerprint and source of true random numbers for RFID tags," in Proceedings of the Conference on RFID Security, 2007.
[12]
P. Jaccard, Etude comparative de la distribution florale dans une portion des Alpes et du Jura. Impr. Corbaz, 1901.
[13]
JEDEC, "LPDDR2 SDRAM Specification," 2010.
[14]
T. Kohno, A. Broido, and K. Claffy, "Remote physical device fingerprinting," IEEE Symposium on Security and Privacy, 2005.
[15]
K. Kurosawa, K. Kuroki, and N. Saitoh, "CCD fingerprint method-identification of a video camera from videotaped images," in Proceedings of the International Conference on Image Processing, 1999.
[16]
T.-H. Le, J. Clédière, C. Servière, and J.-L. Lacoume, "Noise reduction in side channel attack using fourth-order cumulant," IEEE Transactions on Information Forensics and Security, 2007.
[17]
J. Liu, B. Jaiyen, R. Veras, and O. Mutlu, "Raidr: Retention-aware intelligent dram refresh," in International Symposium on Computer Architecture, ser. ISCA, 2012.
[18]
S. Liu, B. Leung, A. Neckar, S. O. Memik, G. Memik, and N. Hardavellas, "Hardware/software techniques for DRAM thermal management," IEEE 17th International Symposium on High Performance Computer Architecture (HPCA), 2011.
[19]
J. Lukas, J. Fridrich, and M. Goljan, "Digital camera identification from sensor pattern noise," IEEE Transactions on Information Forensics and Security, 2006.
[20]
F. J. MacWilliams and N. J. A. Sloane, The theory of error-correcting codes, 1977.
[21]
Micron, DDR2 SDRAM SODIMM: MT4HTF1664HY -- 128MB, MT4HTF3264HY -- 256MB, MT4HTF6464HY -- 512MB, 2005.
[22]
Micron Technology Inc., "Mobile DRAM Power-Saving Features and Power Calculations," 2005.
[23]
N. Nethercote and J. Seward, "Valgrind: a framework for heavyweight dynamic binary instrumentation," in ACM Sigplan Notices, 2007.
[24]
OpenCores.org, "OpenRISC OR1200 processor," http://opencores.org/or1k/OR1200_OpenRISC_Processor.
[25]
A. Pfitzmann and M. Köhntopp, "Anonymity, unobservability, and pseudonymity---a proposal for terminology," in Designing privacy enhancing technologies. Springer, 2001.
[26]
A. C. Polak, S. Dolatshahi, and D. L. Goeckel, "Identifying Wireless Users via Transmitter Imperfections," Selected Areas in Communications, IEEE Journal on, 2011.
[27]
A. Rahmati, M. Hicks, D. E. Holcomb, and K. Fu, "Refreshing thoughts on DRAM: Power saving vs. data integrity," in Workshop on Approximate Computing Across the System Stack (WACAS), 2014.
[28]
A. Rahmati, M. Salajegheh, D. Holcomb, J. Sorber, W. P. Burleson, and K. Fu, "TARDIS: Time and remanence decay in SRAM to implement secure protocols on embedded devices without clocks," in Proceedings of the 21st USENIX Security Symposium, ser. Security '12, 2012.
[29]
S. Rosenblatt, S. Chellappa, A. Cestero, N. Robson, T. Kirihata, and S. S. Iyer, "A Self-Authenticating Chip Architecture Using an Intrinsic Fingerprint of Embedded DRAM," IEEE Journal of Solid-State Circuits, 2013.
[30]
M. Salajegheh, Y. Wang, K. Fu, A. Jiang, and E. G. Learned-Miller, "Exploiting half-wits: smarter storage for low-power devices," in 9th USENIX Conference on File and Storage Technologies, 2011.
[31]
A. Sampson, J. Nelson, K. Strauss, and L. Ceze, "Approximate Storage in Solid-State Memories," IEEE Micro, 2013.
[32]
A. Sampson, W. Dietl, E. Fortuna, D. Gnanapragasam, L. Ceze, and D. Grossman, "Enerj: Approximate data types for safe and general low-power computation," in Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation (PLDI), 2011.
[33]
Samsung Electronics, "KM41464A NMOS DRAM."
[34]
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh, "On the effectiveness of address-space randomization," in Proceedings of the 11th ACM conference on Computer and communications security (CCS), 2004.
[35]
Sun Electronic Systems, Inc., Model EC1X Environmental Chamber User and Repair Manual, 2011.
[36]
Symantec Security Response, "Regin: Top-tier espionage tool enables stealthy surveillance," 2014.
[37]
Texas Instruments Inc., "MSP430F241x, MSP430F261x Mixed Signal Microcontroller," in Texas Instruments Application Report, Jun. 2007, revised Nov. 2012.
[38]
Texas Instruments Inc., "MSP430 hardware tools," in Texas Instruments User's Guide, May. 2009, revised Feb. 2014.
[39]
D. Tschumperlé, "The CImg library," in IPOL Meeting on Image Processing Libraries, 2012.
[40]
R. K. Venkatesan, S. Herr, and E. Rotenberg, "Retention-aware placement in DRAM (RAPID): software methods for quasi-non-volatile DRAM," in The Twelfth International Symposium on High-Performance Computer Architecture (HPCA), 2006.

Cited By

View all
  • (2024)A Novel Methodology for Processor based PUF in Approximate Computing2024 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS58744.2024.10558354(1-5)Online publication date: 19-May-2024
  • (2023)Abusing Commodity DRAMs in IoT Devices to Remotely Spy on TemperatureIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327125218(2991-3005)Online publication date: 1-Jan-2023
  • (2023)Fast Fingerprinting of Cloud-based NISQ Quantum Computers2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55118.2023.10133778(1-12)Online publication date: 1-May-2023
  • Show More Cited By

Index Terms

  1. Probable cause: the deanonymizing effects of approximate DRAM

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ISCA '15: Proceedings of the 42nd Annual International Symposium on Computer Architecture
      June 2015
      768 pages
      ISBN:9781450334020
      DOI:10.1145/2749469
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 June 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article

      Funding Sources

      • NSF CSR
      • Center for Future Architectures Research
      • NSF CNS

      Conference

      ISCA '15
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 543 of 3,203 submissions, 17%

      Upcoming Conference

      ISCA '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)19
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 23 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Novel Methodology for Processor based PUF in Approximate Computing2024 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS58744.2024.10558354(1-5)Online publication date: 19-May-2024
      • (2023)Abusing Commodity DRAMs in IoT Devices to Remotely Spy on TemperatureIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327125218(2991-3005)Online publication date: 1-Jan-2023
      • (2023)Fast Fingerprinting of Cloud-based NISQ Quantum Computers2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55118.2023.10133778(1-12)Online publication date: 1-May-2023
      • (2023)Processor based Intrinsic PUF Design for Approximate Computing: Faith or Reality?2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)10.1109/AsianHOST59942.2023.10409381(1-6)Online publication date: 13-Dec-2023
      • (2023)Fingerprinting and Mapping Cloud FPGA InfrastructuresSecurity of FPGA-Accelerated Cloud Computing Environments10.1007/978-3-031-45395-3_9(239-272)Online publication date: 18-Sep-2023
      • (2022)An Approximate Memory Based Defense Against Model Inversion Attacks to Neural NetworksIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2022.317998010:4(1733-1745)Online publication date: 1-Oct-2022
      • (2020)Fingerprinting Cloud FPGA InfrastructuresProceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays10.1145/3373087.3375322(58-64)Online publication date: 23-Feb-2020
      • (2020)Software Protection Using Dynamic PUFsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.295578815(2053-2068)Online publication date: 2020
      • (2020)Security in Approximate Computing and Approximate Computing for Security: Challenges and OpportunitiesProceedings of the IEEE10.1109/JPROC.2020.3030121108:12(2214-2231)Online publication date: Dec-2020
      • (2019)Spying on Temperature using DRAM2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE.2019.8714882(13-18)Online publication date: Mar-2019
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media