SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
40th International Symposium on Reliable Distributed Systems 2021
Chicago, USA
Scrooge Attack:
Undervolting ARM Processors for Profit
Christian Göttel∗, Konstantinos Parasyris†, Osman Unsal‡, Pascal Felber∗,
Marcelo Pasin∗, Valerio Schiavoni∗
∗University of Neuchâtel, Complex Systems, Switzerland
†Lawrence Livermore National Laboratory, USA
‡Barcelona Supercomputing Center, Spain
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 1 / 15
Introduction
Expanding cloud market share of ARM-based instances
Before the Neoverse architecture, custom-developed or application-grade
microarchitectures were used for sever-grade platforms
Examples: Ampere eMAG, AWS Graviton, Marvell ThunderX
Conservative voltage margin due to process variation
Power management mechnanisms
Undervolted cloud infrastructure for profit
Danger
Low Voltage
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 2 / 15
Introduction
Undervolting:
Decreasing CPU voltage below nominal value
Conserving power
Reducing core aging
Maintining computational performance
Weakening reliability
Introducing errors due to timing violations
0 50 100 150 200 250
0.85
0.9
0.95
1
1.05
Throughput [Mop/s]
ETR
(normalized)
3B 3B+ 4B
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 3 / 15
Introduction
Consequences of undervotling for cloud user and cloud provider
Exploitable by malicious cloud user (out of scope)
Plundervolt [Murdock et al. S&P’20]
V0ltpwn [Kenjar et al. USENIX Security’20]
Detection method: crashing instances such that the user is covered by SLA
Heat dissipation adjusted by processor load and operating points
Temperature has always been a major issue
Non-selective fault injection method
Research questions:
1. What is necessary for a malicious cloud provider in order to pull off a stealthy
undervolting strategy?
2. Does a cloud user have the ability to uncover such an undervolting strategy?
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 4 / 15
Background
ARM in Data Centers
3
B
3
B
+
4
B
B
r
o
a
d
w
e
l
l
K
a
b
y
L
a
k
e
E
P
Y
C
H
a
r
p
e
r
t
o
w
n
0
0.1
0.2
Energy
[J/op]
CPU-bound
3
B
3
B
+
4
B
B
r
o
a
d
w
e
l
l
K
a
b
y
L
a
k
e
E
P
Y
C
H
a
r
p
e
r
t
o
w
n
1
2
Energy
[J/op]
Memory-bound
0
Low power processor design using ARM instances
Energy efficiency is comparable across architectures for CPU-bound benchmarks
26 % (4B) up to 122 % (3B+) less energy efficient than AMD EPYC
60 % (4B) more and 7 % (3B+) less energy efficient than Intel Kaby Lake
Memory-bound benchmarks are less energy efficient due to LPDDR performance
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 5 / 15
Background
Power management
Frequency scaling
(Dynamic) frequency regulation (overlocking, underclocking)
Conserving power and reducing heat dissipation
Voltage scaling
Open loop system (regulated by external setting)
Influences charging & discharging rate of capacitances (frequency)
Dynamic Voltage and Frequency Scaling (DVFS)
Simultaneous software-controlled voltage and frequency regulation
Operating performance points (frequency and voltage pairs)
Adaptive Voltage Scaling (AVS)
Closed loop system (regulated by feedback loop of sensor data)
Accounts for process variation and aging
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 6 / 15
Background
Raspberry Pi
Raspberry Pi 3B v1.2
Level Voltage
+25 mV
-25 mV
0
1
-1
2
-2
1.280 V
1.305 V
1.330 V
1.230 V
1.255 V
...
...
Component Raspberry Pi
Arm Cortex-A Processor
SoC
Broadcom®
VideoCore GPU
Memory 1 GiB and 4 GiB LPDDR
Disk microSD
Ethernet 10 Mbit/s to 1000 Mbit/s
Voltage adjustable in 25 mV steps
4B has no undervolting support
Mimicking server-grade ARM instance
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 7 / 15
Threat Model
shutdown deployed firmware request
reboot voltage reading
boot
deploy ❶ ❷ ❶ ❹ ❺
❸
❻
❷
¶ Exchange undervolted with nominal configuration
· Exchange back nominal with undervolted configuration
¸ Intercept voltage reading requests
¹ Forward voltage reading request
º Return voltage reading request
» Substitute undervolted voltage value by some nominal value
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 8 / 15
Evaluation
Setup
Raspberry Pi 3B, 3B+, 4B
Alciom PowerSpy2
Network-enabled power strip
UART-to-USB cable
Bluetooth dongle
Auxiliary machine
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 9 / 15
Evaluation
Temperature-based Guardband Analysis
30 40 50 60 70 80
1.20
1.25
1.30
Temperature [°C]
Voltage
[V]
safe critical failure nominal
Raspberry Pi 3B
30 40 50 60 70
1.20
1.30
Temperature [°C]
Voltage
[V]
safe critical failure nominal
Raspberry Pi 3B+
30 40 50 60 70 80
0.82
0.84
0.86
Temperature [°C]
Voltage
[V]
safe nominal undervolted
Raspberry Pi 4B
Measurement procedure
Start at nominal voltage and run benchmark
If successful, lower voltage configuration, restart, run benchmark again
Otherwise, reset to nominal voltage, increase temperature and repeat
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 10 / 15
Evaluation
Benchmark
Heat map indicating the relative energy efficiency for an undervolted setup compared to a
nominal setup
C
o
o
l
i
n
g
M
o
d
e
l
U
n
d
e
r
v
o
l
t
a
t
o
m
i
c
b
s
e
a
r
c
h
c
l
o
c
k
f
o
r
k
h
s
e
a
r
c
h
i
c
a
c
h
e
k
i
l
l
m
e
r
g
e
s
o
r
t
m
s
g
p
i
p
e
p
o
l
l
t
i
m
e
r
t
s
e
a
r
c
h
u
r
a
n
d
o
m
v
m
-
r
w
w
c
s
active
3B −75 mV 0.95 0.96 0.95 0.92 0.95 0.95 0.93 0.94 0.91 0.96 0.95 0.94 0.99 0.95 0.96 0.94
3B+ −75 mV 0.94 0.93 0.93 0.87 0.95 0.94 0.96 0.94 0.95 0.92 0.95 0.94 0.95 0.95 0.97 0.94
4B −15 mV 0.99 1.02 0.99 1.02 1.00 0.98 1.04 1.00 0.97 0.70 0.98 0.97 0.91 0.98 1.00 0.99
passive
3B −75 mV 0.95 0.92 0.93 0.91 0.94 0.94 0.94 0.93 0.92 1.03 0.93 0.92 0.96 0.94 0.96 0.93
3B+ −75 mV 0.95 0.96 0.95 0.98 0.95 0.95 0.95 0.95 0.95 0.96 0.94 0.95 0.97 0.96 0.97 0.95
4B −15 mV 0.97 1.02 0.99 1.01 0.99 1.03 1.00 1.00 1.03 1.01 1.00 1.00 0.91 0.99 0.97 0.99
Benchmark of choice: stress-ng (16 out of 169 shown)
The darker the shade, the more energy-efficient the stressor
None of the stressors crashed an undervolted instance
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 11 / 15
Evaluation
Failure Rate
30 40 50 60 70 80
0
0.2
0.4
0.6
0.8
1
Temperature [◦
C]
Failure
rate
3B 0mV 3B -75mV 3B -100mV
3B+ 0mV 3B+ -75mV 3B+ -100mV
Analysis of 265 failed out of 741 multiplication benchmarks
No incorrect benchmark results: multiplication not on timing-critical path
Highest crash probability at 60 °C (40 % 3B+, 90 % 3B)
Crash temperature decreases with undervolting
Process failure injection: 34 % user, 15 % kernel, 51 % unknown
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 12 / 15
Evaluation
Detection Method
Raspberry Pi 3B Raspberry Pi 3B+
Bare metal
[0; 200) [200; 400) [400; 600) [600; 800)
0
5
10
15
20
Run-time [s]
Frequency
[0; 20) [20; 40) [40; 60) [60; 80)
0
5
10
15
20
Temperature [°C]
Frequency
[0; 500) [500; 1,000) [1,000; 1,500)
0
5
10
15
20
Run-time [s]
Frequency
[0; 20) [20; 40) [40; 60) [60; 80)
0
5
10
15
20
Temperature [°C]
Frequency
Container
[0; 200) [200; 400) [400; 600) [600; 800)
0
5
10
15
20
Run-time [s]
Frequency
[0; 20) [20; 40) [40; 60) [60; 80)
0
5
10
15
20
Temperature [°C]
Frequency
[0; 0.5) [0.5; 1) [1; 1.5) [1.5; 2)
·103
0
5
10
15
20
Run-time [s]
Frequency
[0; 20) [20; 40) [40; 60) [60; 80)
0
5
10
15
20
Temperature [°C]
Frequency
Bare-metal: 175 s and 145 s (62 °C, 3B vs 3B+)
Container: 30 s and 250 s
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 13 / 15
Conclusion & Future Work
Conclusion:
Novel attack scenario based on undervolting by a scrooge cloud provider
Undervolting can save on average 5 % and up to 37 % energy
Aggressive undervolting is susceptible to thermal running
Active cooling can mitigate to some extend thermal running
Benchmarks are not the correct approach to guardband analysis
Future:
Apply Scrooge Attack on ARM server architecture
Include virtual machines in the evaluation
Develop a detection method that simultaneously crashes instances
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 14 / 15
Thank you
Thank you for your attention!
The Scrooge Attack data set is publicly available under
https://github.com/ChrisG55/Scrooge-Attack
The views and opinions of the authors do not necessarily reflect those of the U.S. government or
Lawrence Livermore National Security, LLC neither of whom nor any of their employees make any
endorsements, express or implied warranties or representations or assume any legal liability or
responsibility for the accuracy, completeness, or usefulness of the information contained herein. This
work was partially prepared by LLNL under Contract DE-AC52-07NA27344 (LLNL-CONF-817551) and by
the European Union’s Horizon 2020 research and innovation programme under the LEGaTO Project
(legato-project.eu), grant agreement No 780681.
SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch
Scrooge Attack: Undervolting ARM Processors for Profit 15 / 15

Mais conteúdo relacionado

Mais procurados

Virtualized high performance computing with mellanox fdr and ro ce
Virtualized high performance computing with mellanox fdr and ro ceVirtualized high performance computing with mellanox fdr and ro ce
Virtualized high performance computing with mellanox fdr and ro ceinside-BigData.com
 
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV ViewpointSungjin Kang
 
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ..."Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...Edge AI and Vision Alliance
 
Enabling Power-Efficient AI Through Quantization
Enabling Power-Efficient AI Through QuantizationEnabling Power-Efficient AI Through Quantization
Enabling Power-Efficient AI Through QuantizationQualcomm Research
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGAnitin3940
 
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro edPantech ProEd Pvt Ltd
 
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Editor IJARCET
 
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...Edge AI and Vision Alliance
 
Elastic multicore scheduling with the XiTAO runtime
Elastic multicore scheduling with the XiTAO runtimeElastic multicore scheduling with the XiTAO runtime
Elastic multicore scheduling with the XiTAO runtimeMiquel Pericas
 
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...Manoj Subramanian
 

Mais procurados (11)

Virtualized high performance computing with mellanox fdr and ro ce
Virtualized high performance computing with mellanox fdr and ro ceVirtualized high performance computing with mellanox fdr and ro ce
Virtualized high performance computing with mellanox fdr and ro ce
 
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
[OpenStack Day in Korea] Understanding OpenStack from SDN/NV Viewpoint
 
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ..."Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
"Optimizing SSD Object Detection for Low-power Devices," a Presentation from ...
 
Enabling Power-Efficient AI Through Quantization
Enabling Power-Efficient AI Through QuantizationEnabling Power-Efficient AI Through Quantization
Enabling Power-Efficient AI Through Quantization
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
2013 14-vlsi-project-titles-for-me-mtech-pantech-pro ed
 
Vlsi ieee 2014 project titles
Vlsi ieee 2014 project titlesVlsi ieee 2014 project titles
Vlsi ieee 2014 project titles
 
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
 
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
“Secure Hardware Architecture for Embedded Vision,” a Presentation from Neuro...
 
Elastic multicore scheduling with the XiTAO runtime
Elastic multicore scheduling with the XiTAO runtimeElastic multicore scheduling with the XiTAO runtime
Elastic multicore scheduling with the XiTAO runtime
 
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
VLSI Projects, IC Design, Low Power VLSI, Power Management, BIST, FPGA Projec...
 

Semelhante a Scrooge Attack: Undervolting ARM Processors for Profit

FPL 2018: Fault Characterization Through FPGAs Undervolting
FPL 2018: Fault Characterization Through FPGAs UndervoltingFPL 2018: Fault Characterization Through FPGAs Undervolting
FPL 2018: Fault Characterization Through FPGAs UndervoltingLEGATO project
 
IOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offs
IOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offsIOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offs
IOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offsLEGATO project
 
FPGAVolt: Low-power FPGA-based DNN Accelerator through Aggressive Undervolting
FPGAVolt: Low-power FPGA-based DNN Accelerator through Aggressive Undervolting  FPGAVolt: Low-power FPGA-based DNN Accelerator through Aggressive Undervolting
FPGAVolt: Low-power FPGA-based DNN Accelerator through Aggressive Undervolting LEGATO project
 
Green droid ieee-micro
Green droid ieee-microGreen droid ieee-micro
Green droid ieee-microRAJENDRA469
 
Comprehensive evaluation of supply voltage underscaling in FPGA on chip memories
Comprehensive evaluation of supply voltage underscaling in FPGA on chip memoriesComprehensive evaluation of supply voltage underscaling in FPGA on chip memories
Comprehensive evaluation of supply voltage underscaling in FPGA on chip memoriesLEGATO project
 
Understanding the Reliability and Power-Efficiency Trade-offs of Modern FPGAs...
Understanding the Reliability and Power-Efficiency Trade-offs of Modern FPGAs...Understanding the Reliability and Power-Efficiency Trade-offs of Modern FPGAs...
Understanding the Reliability and Power-Efficiency Trade-offs of Modern FPGAs...Behzad Salami
 
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-ResiliencyFPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-ResiliencyLEGATO project
 
Evaluating Built-In ECC of FPGA On-Chip Memories for the Mitigation of Underv...
Evaluating Built-In ECC of FPGA On-Chip Memories for the Mitigation of Underv...Evaluating Built-In ECC of FPGA On-Chip Memories for the Mitigation of Underv...
Evaluating Built-In ECC of FPGA On-Chip Memories for the Mitigation of Underv...bscdissemination
 
IRJET- Proposing a RTD-Based Block for On-Chip GPU Caches to Reduce Static Po...
IRJET- Proposing a RTD-Based Block for On-Chip GPU Caches to Reduce Static Po...IRJET- Proposing a RTD-Based Block for On-Chip GPU Caches to Reduce Static Po...
IRJET- Proposing a RTD-Based Block for On-Chip GPU Caches to Reduce Static Po...IRJET Journal
 
How to leverage Quantum Computing and Generative AI for Clean Energy Transiti...
How to leverage Quantum Computing and Generative AI for Clean Energy Transiti...How to leverage Quantum Computing and Generative AI for Clean Energy Transiti...
How to leverage Quantum Computing and Generative AI for Clean Energy Transiti...Sayonsom Chanda
 
CMOS LOW POWER CELL LIBRARY FOR DIGITAL DESIGN
CMOS LOW POWER CELL LIBRARY FOR DIGITAL DESIGNCMOS LOW POWER CELL LIBRARY FOR DIGITAL DESIGN
CMOS LOW POWER CELL LIBRARY FOR DIGITAL DESIGNVLSICS Design
 
Microsoft Azure in HPC scenarios
Microsoft Azure in HPC scenariosMicrosoft Azure in HPC scenarios
Microsoft Azure in HPC scenariosmictc
 
Cielution imaps short_presentation_public
Cielution imaps short_presentation_publicCielution imaps short_presentation_public
Cielution imaps short_presentation_publicKamal Karimanal
 
Stepan Sutula - PhD Dissertation 2015 - Low-Power High-Resolution CMOS Switch...
Stepan Sutula - PhD Dissertation 2015 - Low-Power High-Resolution CMOS Switch...Stepan Sutula - PhD Dissertation 2015 - Low-Power High-Resolution CMOS Switch...
Stepan Sutula - PhD Dissertation 2015 - Low-Power High-Resolution CMOS Switch...Stepan Sutula
 
Analysis Of Power Dissipation Amp Low Power VLSI Chip Design
Analysis Of Power Dissipation  Amp  Low Power VLSI Chip DesignAnalysis Of Power Dissipation  Amp  Low Power VLSI Chip Design
Analysis Of Power Dissipation Amp Low Power VLSI Chip DesignBryce Nelson
 
Analysis of Power Dissipation & Low Power VLSI Chip Design
Analysis of Power Dissipation & Low Power VLSI Chip DesignAnalysis of Power Dissipation & Low Power VLSI Chip Design
Analysis of Power Dissipation & Low Power VLSI Chip DesignEditor IJMTER
 
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC DefconRussia
 
DESIGN OF IMPROVED RESISTOR LESS 45NM SWITCHED INVERTER SCHEME (SIS) ANALOG T...
DESIGN OF IMPROVED RESISTOR LESS 45NM SWITCHED INVERTER SCHEME (SIS) ANALOG T...DESIGN OF IMPROVED RESISTOR LESS 45NM SWITCHED INVERTER SCHEME (SIS) ANALOG T...
DESIGN OF IMPROVED RESISTOR LESS 45NM SWITCHED INVERTER SCHEME (SIS) ANALOG T...VLSICS Design
 
287233027-Chapter-1-Fundamentals-of-Computer-Design-ppt.ppt
287233027-Chapter-1-Fundamentals-of-Computer-Design-ppt.ppt287233027-Chapter-1-Fundamentals-of-Computer-Design-ppt.ppt
287233027-Chapter-1-Fundamentals-of-Computer-Design-ppt.pptDrUrvashiBansal
 

Semelhante a Scrooge Attack: Undervolting ARM Processors for Profit (20)

FPL 2018: Fault Characterization Through FPGAs Undervolting
FPL 2018: Fault Characterization Through FPGAs UndervoltingFPL 2018: Fault Characterization Through FPGAs Undervolting
FPL 2018: Fault Characterization Through FPGAs Undervolting
 
IOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offs
IOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offsIOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offs
IOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offs
 
FPGAVolt: Low-power FPGA-based DNN Accelerator through Aggressive Undervolting
FPGAVolt: Low-power FPGA-based DNN Accelerator through Aggressive Undervolting  FPGAVolt: Low-power FPGA-based DNN Accelerator through Aggressive Undervolting
FPGAVolt: Low-power FPGA-based DNN Accelerator through Aggressive Undervolting
 
Green droid ieee-micro
Green droid ieee-microGreen droid ieee-micro
Green droid ieee-micro
 
Comprehensive evaluation of supply voltage underscaling in FPGA on chip memories
Comprehensive evaluation of supply voltage underscaling in FPGA on chip memoriesComprehensive evaluation of supply voltage underscaling in FPGA on chip memories
Comprehensive evaluation of supply voltage underscaling in FPGA on chip memories
 
Understanding the Reliability and Power-Efficiency Trade-offs of Modern FPGAs...
Understanding the Reliability and Power-Efficiency Trade-offs of Modern FPGAs...Understanding the Reliability and Power-Efficiency Trade-offs of Modern FPGAs...
Understanding the Reliability and Power-Efficiency Trade-offs of Modern FPGAs...
 
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-ResiliencyFPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
FPGA Undervolting and Checkpointing for Energy-Efficiency and Error-Resiliency
 
Evaluating Built-In ECC of FPGA On-Chip Memories for the Mitigation of Underv...
Evaluating Built-In ECC of FPGA On-Chip Memories for the Mitigation of Underv...Evaluating Built-In ECC of FPGA On-Chip Memories for the Mitigation of Underv...
Evaluating Built-In ECC of FPGA On-Chip Memories for the Mitigation of Underv...
 
IRJET- Proposing a RTD-Based Block for On-Chip GPU Caches to Reduce Static Po...
IRJET- Proposing a RTD-Based Block for On-Chip GPU Caches to Reduce Static Po...IRJET- Proposing a RTD-Based Block for On-Chip GPU Caches to Reduce Static Po...
IRJET- Proposing a RTD-Based Block for On-Chip GPU Caches to Reduce Static Po...
 
Ieee 07059100
Ieee 07059100Ieee 07059100
Ieee 07059100
 
How to leverage Quantum Computing and Generative AI for Clean Energy Transiti...
How to leverage Quantum Computing and Generative AI for Clean Energy Transiti...How to leverage Quantum Computing and Generative AI for Clean Energy Transiti...
How to leverage Quantum Computing and Generative AI for Clean Energy Transiti...
 
CMOS LOW POWER CELL LIBRARY FOR DIGITAL DESIGN
CMOS LOW POWER CELL LIBRARY FOR DIGITAL DESIGNCMOS LOW POWER CELL LIBRARY FOR DIGITAL DESIGN
CMOS LOW POWER CELL LIBRARY FOR DIGITAL DESIGN
 
Microsoft Azure in HPC scenarios
Microsoft Azure in HPC scenariosMicrosoft Azure in HPC scenarios
Microsoft Azure in HPC scenarios
 
Cielution imaps short_presentation_public
Cielution imaps short_presentation_publicCielution imaps short_presentation_public
Cielution imaps short_presentation_public
 
Stepan Sutula - PhD Dissertation 2015 - Low-Power High-Resolution CMOS Switch...
Stepan Sutula - PhD Dissertation 2015 - Low-Power High-Resolution CMOS Switch...Stepan Sutula - PhD Dissertation 2015 - Low-Power High-Resolution CMOS Switch...
Stepan Sutula - PhD Dissertation 2015 - Low-Power High-Resolution CMOS Switch...
 
Analysis Of Power Dissipation Amp Low Power VLSI Chip Design
Analysis Of Power Dissipation  Amp  Low Power VLSI Chip DesignAnalysis Of Power Dissipation  Amp  Low Power VLSI Chip Design
Analysis Of Power Dissipation Amp Low Power VLSI Chip Design
 
Analysis of Power Dissipation & Low Power VLSI Chip Design
Analysis of Power Dissipation & Low Power VLSI Chip DesignAnalysis of Power Dissipation & Low Power VLSI Chip Design
Analysis of Power Dissipation & Low Power VLSI Chip Design
 
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
 
DESIGN OF IMPROVED RESISTOR LESS 45NM SWITCHED INVERTER SCHEME (SIS) ANALOG T...
DESIGN OF IMPROVED RESISTOR LESS 45NM SWITCHED INVERTER SCHEME (SIS) ANALOG T...DESIGN OF IMPROVED RESISTOR LESS 45NM SWITCHED INVERTER SCHEME (SIS) ANALOG T...
DESIGN OF IMPROVED RESISTOR LESS 45NM SWITCHED INVERTER SCHEME (SIS) ANALOG T...
 
287233027-Chapter-1-Fundamentals-of-Computer-Design-ppt.ppt
287233027-Chapter-1-Fundamentals-of-Computer-Design-ppt.ppt287233027-Chapter-1-Fundamentals-of-Computer-Design-ppt.ppt
287233027-Chapter-1-Fundamentals-of-Computer-Design-ppt.ppt
 

Mais de LEGATO project

A practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating systemA practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating systemLEGATO project
 
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsTEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsLEGATO project
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworkLEGATO project
 
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...LEGATO project
 
LEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use CaseLEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use CaseLEGATO project
 
Smart Home AI at the edge
Smart Home AI at the edgeSmart Home AI at the edge
Smart Home AI at the edgeLEGATO project
 
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGATO project
 
LEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming ModelsLEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming ModelsLEGATO project
 
LEGaTO: Software Stack Runtimes
LEGaTO: Software Stack RuntimesLEGaTO: Software Stack Runtimes
LEGaTO: Software Stack RuntimesLEGATO project
 
LEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous HardwareLEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous HardwareLEGATO project
 
LEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing WorkshopLEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing WorkshopLEGATO project
 
Infection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow ComputingInfection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow ComputingLEGATO project
 
Smart Home - AI at the edge
Smart Home - AI at the edgeSmart Home - AI at the edge
Smart Home - AI at the edgeLEGATO project
 
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...LEGATO project
 
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric EnvironmentsScheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric EnvironmentsLEGATO project
 
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient ComputingRECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient ComputingLEGATO project
 
Secure Task-Based Programming with OmpSs and SGX
Secure Task-Based Programming with OmpSs and SGXSecure Task-Based Programming with OmpSs and SGX
Secure Task-Based Programming with OmpSs and SGXLEGATO project
 
HiPerMAb: A statistical tool for judging the potential of short fat data
HiPerMAb: A statistical tool for judging the potential of short fat dataHiPerMAb: A statistical tool for judging the potential of short fat data
HiPerMAb: A statistical tool for judging the potential of short fat dataLEGATO project
 

Mais de LEGATO project (20)

A practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating systemA practical approach for updating an integrity-enforced operating system
A practical approach for updating an integrity-enforced operating system
 
TEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEsTEEMon: A continuous performance monitoring framework for TEEs
TEEMon: A continuous performance monitoring framework for TEEs
 
secureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow FrameworksecureTF: A Secure TensorFlow Framework
secureTF: A Secure TensorFlow Framework
 
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
PipeTune: Pipeline Parallelism of Hyper and System Parameters Tuning for Deep...
 
LEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use CaseLEGaTO: Machine Learning Use Case
LEGaTO: Machine Learning Use Case
 
Smart Home AI at the edge
Smart Home AI at the edgeSmart Home AI at the edge
Smart Home AI at the edge
 
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the projectLEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
LEGaTO: Low-Energy Heterogeneous Computing Use of AI in the project
 
LEGaTO Integration
LEGaTO IntegrationLEGaTO Integration
LEGaTO Integration
 
LEGaTO: Use cases
LEGaTO: Use casesLEGaTO: Use cases
LEGaTO: Use cases
 
LEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming ModelsLEGaTO: Software Stack Programming Models
LEGaTO: Software Stack Programming Models
 
LEGaTO: Software Stack Runtimes
LEGaTO: Software Stack RuntimesLEGaTO: Software Stack Runtimes
LEGaTO: Software Stack Runtimes
 
LEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous HardwareLEGaTO Heterogeneous Hardware
LEGaTO Heterogeneous Hardware
 
LEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing WorkshopLEGaTO: Low-Energy Heterogeneous Computing Workshop
LEGaTO: Low-Energy Heterogeneous Computing Workshop
 
Infection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow ComputingInfection Research with Maxeler Dataflow Computing
Infection Research with Maxeler Dataflow Computing
 
Smart Home - AI at the edge
Smart Home - AI at the edgeSmart Home - AI at the edge
Smart Home - AI at the edge
 
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...Device Data Directory and Asynchronous execution: A path to heterogeneous com...
Device Data Directory and Asynchronous execution: A path to heterogeneous com...
 
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric EnvironmentsScheduling Task-parallel Applications in Dynamically Asymmetric Environments
Scheduling Task-parallel Applications in Dynamically Asymmetric Environments
 
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient ComputingRECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
RECS – Cloud to Edge Microserver Platform for Energy-Efficient Computing
 
Secure Task-Based Programming with OmpSs and SGX
Secure Task-Based Programming with OmpSs and SGXSecure Task-Based Programming with OmpSs and SGX
Secure Task-Based Programming with OmpSs and SGX
 
HiPerMAb: A statistical tool for judging the potential of short fat data
HiPerMAb: A statistical tool for judging the potential of short fat dataHiPerMAb: A statistical tool for judging the potential of short fat data
HiPerMAb: A statistical tool for judging the potential of short fat data
 

Último

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Último (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Scrooge Attack: Undervolting ARM Processors for Profit

  • 1. 40th International Symposium on Reliable Distributed Systems 2021 Chicago, USA Scrooge Attack: Undervolting ARM Processors for Profit Christian Göttel∗, Konstantinos Parasyris†, Osman Unsal‡, Pascal Felber∗, Marcelo Pasin∗, Valerio Schiavoni∗ ∗University of Neuchâtel, Complex Systems, Switzerland †Lawrence Livermore National Laboratory, USA ‡Barcelona Supercomputing Center, Spain SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 1 / 15
  • 2. Introduction Expanding cloud market share of ARM-based instances Before the Neoverse architecture, custom-developed or application-grade microarchitectures were used for sever-grade platforms Examples: Ampere eMAG, AWS Graviton, Marvell ThunderX Conservative voltage margin due to process variation Power management mechnanisms Undervolted cloud infrastructure for profit Danger Low Voltage SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 2 / 15
  • 3. Introduction Undervolting: Decreasing CPU voltage below nominal value Conserving power Reducing core aging Maintining computational performance Weakening reliability Introducing errors due to timing violations 0 50 100 150 200 250 0.85 0.9 0.95 1 1.05 Throughput [Mop/s] ETR (normalized) 3B 3B+ 4B SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 3 / 15
  • 4. Introduction Consequences of undervotling for cloud user and cloud provider Exploitable by malicious cloud user (out of scope) Plundervolt [Murdock et al. S&P’20] V0ltpwn [Kenjar et al. USENIX Security’20] Detection method: crashing instances such that the user is covered by SLA Heat dissipation adjusted by processor load and operating points Temperature has always been a major issue Non-selective fault injection method Research questions: 1. What is necessary for a malicious cloud provider in order to pull off a stealthy undervolting strategy? 2. Does a cloud user have the ability to uncover such an undervolting strategy? SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 4 / 15
  • 5. Background ARM in Data Centers 3 B 3 B + 4 B B r o a d w e l l K a b y L a k e E P Y C H a r p e r t o w n 0 0.1 0.2 Energy [J/op] CPU-bound 3 B 3 B + 4 B B r o a d w e l l K a b y L a k e E P Y C H a r p e r t o w n 1 2 Energy [J/op] Memory-bound 0 Low power processor design using ARM instances Energy efficiency is comparable across architectures for CPU-bound benchmarks 26 % (4B) up to 122 % (3B+) less energy efficient than AMD EPYC 60 % (4B) more and 7 % (3B+) less energy efficient than Intel Kaby Lake Memory-bound benchmarks are less energy efficient due to LPDDR performance SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 5 / 15
  • 6. Background Power management Frequency scaling (Dynamic) frequency regulation (overlocking, underclocking) Conserving power and reducing heat dissipation Voltage scaling Open loop system (regulated by external setting) Influences charging & discharging rate of capacitances (frequency) Dynamic Voltage and Frequency Scaling (DVFS) Simultaneous software-controlled voltage and frequency regulation Operating performance points (frequency and voltage pairs) Adaptive Voltage Scaling (AVS) Closed loop system (regulated by feedback loop of sensor data) Accounts for process variation and aging SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 6 / 15
  • 7. Background Raspberry Pi Raspberry Pi 3B v1.2 Level Voltage +25 mV -25 mV 0 1 -1 2 -2 1.280 V 1.305 V 1.330 V 1.230 V 1.255 V ... ... Component Raspberry Pi Arm Cortex-A Processor SoC Broadcom® VideoCore GPU Memory 1 GiB and 4 GiB LPDDR Disk microSD Ethernet 10 Mbit/s to 1000 Mbit/s Voltage adjustable in 25 mV steps 4B has no undervolting support Mimicking server-grade ARM instance SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 7 / 15
  • 8. Threat Model shutdown deployed firmware request reboot voltage reading boot deploy ❶ ❷ ❶ ❹ ❺ ❸ ❻ ❷ ¶ Exchange undervolted with nominal configuration · Exchange back nominal with undervolted configuration ¸ Intercept voltage reading requests ¹ Forward voltage reading request º Return voltage reading request » Substitute undervolted voltage value by some nominal value SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 8 / 15
  • 9. Evaluation Setup Raspberry Pi 3B, 3B+, 4B Alciom PowerSpy2 Network-enabled power strip UART-to-USB cable Bluetooth dongle Auxiliary machine SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 9 / 15
  • 10. Evaluation Temperature-based Guardband Analysis 30 40 50 60 70 80 1.20 1.25 1.30 Temperature [°C] Voltage [V] safe critical failure nominal Raspberry Pi 3B 30 40 50 60 70 1.20 1.30 Temperature [°C] Voltage [V] safe critical failure nominal Raspberry Pi 3B+ 30 40 50 60 70 80 0.82 0.84 0.86 Temperature [°C] Voltage [V] safe nominal undervolted Raspberry Pi 4B Measurement procedure Start at nominal voltage and run benchmark If successful, lower voltage configuration, restart, run benchmark again Otherwise, reset to nominal voltage, increase temperature and repeat SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 10 / 15
  • 11. Evaluation Benchmark Heat map indicating the relative energy efficiency for an undervolted setup compared to a nominal setup C o o l i n g M o d e l U n d e r v o l t a t o m i c b s e a r c h c l o c k f o r k h s e a r c h i c a c h e k i l l m e r g e s o r t m s g p i p e p o l l t i m e r t s e a r c h u r a n d o m v m - r w w c s active 3B −75 mV 0.95 0.96 0.95 0.92 0.95 0.95 0.93 0.94 0.91 0.96 0.95 0.94 0.99 0.95 0.96 0.94 3B+ −75 mV 0.94 0.93 0.93 0.87 0.95 0.94 0.96 0.94 0.95 0.92 0.95 0.94 0.95 0.95 0.97 0.94 4B −15 mV 0.99 1.02 0.99 1.02 1.00 0.98 1.04 1.00 0.97 0.70 0.98 0.97 0.91 0.98 1.00 0.99 passive 3B −75 mV 0.95 0.92 0.93 0.91 0.94 0.94 0.94 0.93 0.92 1.03 0.93 0.92 0.96 0.94 0.96 0.93 3B+ −75 mV 0.95 0.96 0.95 0.98 0.95 0.95 0.95 0.95 0.95 0.96 0.94 0.95 0.97 0.96 0.97 0.95 4B −15 mV 0.97 1.02 0.99 1.01 0.99 1.03 1.00 1.00 1.03 1.01 1.00 1.00 0.91 0.99 0.97 0.99 Benchmark of choice: stress-ng (16 out of 169 shown) The darker the shade, the more energy-efficient the stressor None of the stressors crashed an undervolted instance SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 11 / 15
  • 12. Evaluation Failure Rate 30 40 50 60 70 80 0 0.2 0.4 0.6 0.8 1 Temperature [◦ C] Failure rate 3B 0mV 3B -75mV 3B -100mV 3B+ 0mV 3B+ -75mV 3B+ -100mV Analysis of 265 failed out of 741 multiplication benchmarks No incorrect benchmark results: multiplication not on timing-critical path Highest crash probability at 60 °C (40 % 3B+, 90 % 3B) Crash temperature decreases with undervolting Process failure injection: 34 % user, 15 % kernel, 51 % unknown SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 12 / 15
  • 13. Evaluation Detection Method Raspberry Pi 3B Raspberry Pi 3B+ Bare metal [0; 200) [200; 400) [400; 600) [600; 800) 0 5 10 15 20 Run-time [s] Frequency [0; 20) [20; 40) [40; 60) [60; 80) 0 5 10 15 20 Temperature [°C] Frequency [0; 500) [500; 1,000) [1,000; 1,500) 0 5 10 15 20 Run-time [s] Frequency [0; 20) [20; 40) [40; 60) [60; 80) 0 5 10 15 20 Temperature [°C] Frequency Container [0; 200) [200; 400) [400; 600) [600; 800) 0 5 10 15 20 Run-time [s] Frequency [0; 20) [20; 40) [40; 60) [60; 80) 0 5 10 15 20 Temperature [°C] Frequency [0; 0.5) [0.5; 1) [1; 1.5) [1.5; 2) ·103 0 5 10 15 20 Run-time [s] Frequency [0; 20) [20; 40) [40; 60) [60; 80) 0 5 10 15 20 Temperature [°C] Frequency Bare-metal: 175 s and 145 s (62 °C, 3B vs 3B+) Container: 30 s and 250 s SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 13 / 15
  • 14. Conclusion & Future Work Conclusion: Novel attack scenario based on undervolting by a scrooge cloud provider Undervolting can save on average 5 % and up to 37 % energy Aggressive undervolting is susceptible to thermal running Active cooling can mitigate to some extend thermal running Benchmarks are not the correct approach to guardband analysis Future: Apply Scrooge Attack on ARM server architecture Include virtual machines in the evaluation Develop a detection method that simultaneously crashes instances SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 14 / 15
  • 15. Thank you Thank you for your attention! The Scrooge Attack data set is publicly available under https://github.com/ChrisG55/Scrooge-Attack The views and opinions of the authors do not necessarily reflect those of the U.S. government or Lawrence Livermore National Security, LLC neither of whom nor any of their employees make any endorsements, express or implied warranties or representations or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of the information contained herein. This work was partially prepared by LLNL under Contract DE-AC52-07NA27344 (LLNL-CONF-817551) and by the European Union’s Horizon 2020 research and innovation programme under the LEGaTO Project (legato-project.eu), grant agreement No 780681. SRDS’21 22.09.2021 | IIUN, LLNL & BSC | Christian Göttel | christian.goettel@unine.ch Scrooge Attack: Undervolting ARM Processors for Profit 15 / 15