Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3548606.3563528acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: CFMAP: A Robust CPU Clock Fingerprint Model for Device Authentication

Published: 07 November 2022 Publication History

Abstract

The internal clock of the CPU uses oscillators made from quartz crystals. Small changes in these crystals can cause small but measurable differences in the clock frequency. Under a low CPU load, the function execution time distribution follows the Pareto distribution. However, the function execution time distribution no longer follows the Pareto distribution when the CPU load is high, and the CPU clock fingerprint becomes invalid. In view of this problem, this paper proposes an adaptive Pareto principle that adaptively adjusts the distribution according to the CPU load. Based on this, the robust CPU Clock Fingerprint Model based on the Adaptive Pareto Principle (CFMAP) is proposed. Via a KNN-based fingerprint recognition method, CFMAP solves the instability of existing CPU clock fingerprints under a high CPU load. Experiments show that the average recognition rate of CFMAP fingerprints is 96.82%. Moreover, they are highly robust against CPU load attacks and virtual machine attacks.

References

[1]
M. Peinado 2005. Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like. US20050216743[P].
[2]
P. Eckersley. 2010. How Unique is Your Web Browser? In Proceeding of Privacy Enhancing Technologies Symposium, LNCS vol. 6205.
[3]
Marcin Gabryel, Konrad Grzanek and Yoichi Hayashi. 2020. Browser Fingerprint Coding Methods Increasing the Effectiveness of User Identification in the Web Traffic. Journal of Artificial Intelligence and Soft Computing Research, 10(4):243--253.
[4]
Xuerong Cui, Mengyan Wang and Juan Li. 2021. Indoor Wi-Fi Positioning Algorithm Based on Location Fingerprint. Mobile Networks and Applications, 26, 146--155.
[5]
S. Wang, L. Peng, H. Fu. 2020. A Convolutional Neural Network-Based RF Fingerprinting Identification Scheme for Mobile Phones. In Proceedings of IEEE INFOCOM, 115--120. 9163058.
[6]
Hong Shen, Junfa Liu and Yiqiang Chen. 2019. Semi supervised scene recognition method based on multimode fusion. Computer science, 46 (12): 306--312.
[7]
Timothy J Salo. 2007. Multi-Factor Fingerprints for Personal Computer Hardware. In Proceedings of the Military Communications Conference (MILCOM). IEEE.
[8]
Iskander Sanchez-Rola, Igor Santos, and Davide Bal-zarotti. 2018. Clock around the clock: time-based device fingerprinting. In Proceedings of the 2018 ACM SIG-SAC Conference on Computer and Communications Security.

Cited By

View all
  • (2024)GNSS Receiver Fingerprinting Based on Time Skew of Embedded CSAC ClockSensors10.3390/s2415489724:15(4897)Online publication date: 28-Jul-2024
  • (2024)Algorithm for Generation of Over Clock Attack for Security Assessment of Cyber-Physical Systems2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT)10.1109/CSNT60213.2024.10546096(194-198)Online publication date: 6-Apr-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
November 2022
3598 pages
ISBN:9781450394505
DOI:10.1145/3548606
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2022

Check for updates

Author Tags

  1. adaptive pareto principle
  2. cpu clock fingerprint
  3. device authentication
  4. device fingerprint

Qualifiers

  • Poster

Funding Sources

  • National Natural Science Foundation of China
  • National Key R&D Program of China
  • Ant Financial Science Funds for Security Research

Conference

CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)2
Reflects downloads up to 28 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)GNSS Receiver Fingerprinting Based on Time Skew of Embedded CSAC ClockSensors10.3390/s2415489724:15(4897)Online publication date: 28-Jul-2024
  • (2024)Algorithm for Generation of Over Clock Attack for Security Assessment of Cyber-Physical Systems2024 IEEE 13th International Conference on Communication Systems and Network Technologies (CSNT)10.1109/CSNT60213.2024.10546096(194-198)Online publication date: 6-Apr-2024

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media