Title:
Covert/side channel analysis, modeling and capacity estimation

dc.contributor.advisor Zajić, Alenka
dc.contributor.advisor Prvulovic, Milos
dc.contributor.author Yilmaz, Baki Berkay Berkay
dc.contributor.committeeMember Bloch, Matthieu R.
dc.contributor.committeeMember Keromytis, Angelos D.
dc.contributor.committeeMember Durgin, Gregory D.
dc.contributor.committeeMember Orso, Alessandro
dc.contributor.department Electrical and Computer Engineering
dc.date.accessioned 2020-05-20T17:01:32Z
dc.date.available 2020-05-20T17:01:32Z
dc.date.created 2020-05
dc.date.issued 2020-04-07
dc.date.submitted May 2020
dc.date.updated 2020-05-20T17:01:32Z
dc.description.abstract Side/Covert channels are asynchronous channels which are not designed nor intended to transfer information. These channels are generated as a byproduct of performing legitimate program activities on the hardware of computer systems. Although there are many approaches to analyze and estimate their information leakage capacity, they do not consider 1) asynchronous nature of side/covert channels, 2) variability inexecution time of each instruction, and 3) interrupts due to other software activities. Ignoring any of these features can result in underestimating the severity of information leakage, and inaccurate models that can mislead the analysis of these channels. To successfully evaluate the severity of side/covert channels, our research has 1)modeled the side channels considering the dependency among instructions as a consequence of processor pipeline and program functionality, 2) modeled and analyzed an electromagnetic (EM) covert channel, generated due to computer activities, and proposed bounds for the capacity of these channels, 3) introduced a generalized model for covert channels with different sources (i.e. power, cache, EM, etc.) and an assessment methodology to analyze systems against attacks based on these channels, and 4) modeled side channel signals emanated while executing instruction sequences on a processor, which leverages design-stage investigation of new products. The work provides a deep understanding of side/covert channels generated by program activities which can be utilized to secure devices by optimizing their designs to minimize information leakage.
dc.description.degree Ph.D.
dc.format.mimetype application/pdf
dc.identifier.uri http://hdl.handle.net/1853/62810
dc.language.iso en_US
dc.publisher Georgia Institute of Technology
dc.subject Covert channels
dc.subject Side channels
dc.subject Security
dc.subject Information-theoretic security
dc.subject Modeling
dc.subject Cyber security
dc.title Covert/side channel analysis, modeling and capacity estimation
dc.type Text
dc.type.genre Dissertation
dspace.entity.type Publication
local.contributor.advisor Zajić, Alenka
local.contributor.advisor Prvulovic, Milos
local.contributor.corporatename School of Electrical and Computer Engineering
local.contributor.corporatename College of Engineering
relation.isAdvisorOfPublication 20a27f4d-7ffa-4879-8c9f-e37b736ed3df
relation.isAdvisorOfPublication 2d678067-bb81-43c7-be94-bd87bced736e
relation.isOrgUnitOfPublication 5b7adef2-447c-4270-b9fc-846bd76f80f2
relation.isOrgUnitOfPublication 7c022d60-21d5-497c-b552-95e489a06569
thesis.degree.level Doctoral
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
YILMAZ-DISSERTATION-2020.pdf
Size:
17.62 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
LICENSE.txt
Size:
3.87 KB
Format:
Plain Text
Description: