BEGIN:VCALENDAR
VERSION:2.0
PRODID:Linklings LLC
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
X-LIC-LOCATION:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:19700308T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:19701101T020000
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240626T180033Z
LOCATION:3012\, 3rd Floor
DTSTART;TZID=America/Los_Angeles:20240626T140000
DTEND;TZID=America/Los_Angeles:20240626T141500
UID:dac_DAC 2024_sess155_RESEARCH164@linklings.com
SUMMARY:ThermalScope: A Practical Interrupt Side Channel Attack Based on T
 hermal Event Interrupts
DESCRIPTION:Research Manuscript\n\nXin Zhang (Peking University); Zhi Zhan
 g (University of Western Australia); Qingni Shen (Peking University); Wenh
 ao Wang (Institute of Information Engineering, Chinese Academy of Sciences
 ); Yansong Gao (Data61, CSIRO); and Zhuoxi Yang and Zhonghai Wu (Peking Un
 iversity)\n\nWhile interrupts play a critical role in modern OSes, they ha
 ve been exploited as a wide range of side channel attacks to break system 
 confidentiality, such as keystroke interrupts, graphic interrupts and netw
 ork interrupts. In this paper, we propose ThermalScope, a new side channel
  that exploits thermal event interrupts, which is adaptable for both nativ
 e and browser scenarios and incorporates two heat amplifying techniques. T
 he exploited thermal event interrupts are activated only when the CPU pack
 age temperature reaches a fixed threshold that is determined by manufactur
 ers. Our key observation is that workloads running on CPUs inevitably gene
 rates their distinct heat, which can be correlated with the thermal event 
 interrupts. To demonstrate the viability of ThermalScope, we conduct a com
 prehensive evaluation on multiple Ubuntu OSes with different Intel-based C
 PUs. First, we show that the activation of thermal event interrupts correl
 ates with the level of CPU temperature. We then apply ThermalScope to moun
 t different side channel attacks, i.e., building covert channels with a tr
 ansmission rate of 0.1 b/s, fingerprinting DNN model architectures with an
  accuracy of over 90% and breaking KASLR within 8.2 hours.\n\nTopic: Secur
 ity\n\nKeyword: Hardware Security: Attack and Defense\n\nSession Chairs: A
 vani Dave (Intel Corporation) and Vincent Immler (Oregon State University)
END:VEVENT
END:VCALENDAR
