By Topic

Temperature Attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)

Confining a program during its execution so that it can't leak information to other programs is an old concern. Recently, several researchers succeeded in fingerprinting distant machines by measuring temperature side effects on clocks. But can temperature also leak secrets in a computer or a chip? We started by implementing a covert channel between two processes (a sender and a receiver) running on the same machine. Producing heat is simple: all the sender must do is launch massive calculations. To sense temperature in the machine, we considered three options: fan-based solutions, built-in sensors; and faults as heat detectors.

Published in:

Security & Privacy, IEEE  (Volume:7 ,  Issue: 2 )