*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************
Title: Leveraging Side-Channel Signals for Security and Trust
Nader Sehatbakhsh
Ph.D. Candidate
School of Computer Science, Georgia Institute of Technology
(http://www.prism.gatech.edu/~nsehatbakhsh3/)
Date: May 12th, 2020 (Tuesday)
Time: 11:00 AM - 1:00 PM
Location: https://bluejeans.com/562982749
Committee:
Dr. Milos Prvulovic (advisor) - School of Computer Science, Georgia Institute of Technology
Dr. Alenka Zajic - School of Electrical and Computer Engineering, Georgia Institute of Technology
Dr. Moin Qureshi - School of Electrical and Computer Engineering, Georgia Institute of Technology
Dr. Hyesoon Kim - School of Computer Science, Georgia Institute of Technology
Dr. Angelos Keromytis - School of Electrical and Computer Engineering, Georgia Institute of Technology
Abstract:
This decade has already seen a significant surge in the number of cyber-attacks. With the exponential growth of computers in numbers, due to the rise of cyber-physical systems (CPS) and internet-of-things (IoT) devices, and their ever-increasing importance in controlling critical tasks, it is expected that cybersecurity and data privacy become even more serious problems in the next decade.
To this end, this dissertation presents our methods and findings in designing secure computing systems using two main themes: 1) by discovering, modeling, and mitigating side-channels, and 2) by leveraging side-channels for useful purposes such as debugging and security monitoring. Specifically, in this dissertation, I will first present our novel method on debugging and securing resource-limited devices such as embedded systems, CPSs, and IoTs by externally monitoring these devices using analog side-channels (e.g., electromagnetic emanations, power fluctuations, etc.) that are unintentionally created by these devices. I will describe how analog side-channel signals can be also leveraged for profiling, intrusion detection, and establishing a trusted execution environment (TEE) on resource-constrained devices without incurring any overhead or requiring any hardware-support on the monitored device and/or any intrusion to its functionality. In the second part of this dissertation, I will demonstrate how we can mitigate information leakage vulnerabilities by accurately modeling analog side-channels. I will first present our findings in discovering a new side-channel vulnerability on modern computers. I finally present our approach in designing an open-source microarchitectural simulator that can accurately simulate analog side-channel signals (electromagnetic and power side-channels) in a variety of low-end processors.