Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical...

27
Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University WEST-2010

Transcript of Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical...

Page 1: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Defining Anomalous Behavior for Phase Change Memory

Siddhartha Chhabra and Yan Solihin

Electrical and Computer EngineeringNorth Carolina State University

WEST-2010

Page 2: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

2

Outline Defining Anomalous Behavior

Motivation Related Work Experimental Setup Anomaly Detection Mechanism

Writebacks Per Instruction (WPI) Write Traffic Distribution (WTD) Writeback Traffic Per Page (WTPP) Hardware Implementation

PCM, a replacement for DRAM ? Conclusions

Chhabra, Solihin – PCM Anomalous Behavior

Page 3: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Motivation

3Chhabra, Solihin – PCM Anomalous Behavior

Core

A

Main Memory

DISK

CoreCore

AA

Horizontal Expansion

Vertical Expansion

Main Memory

However:DRAM faces cost, energy and scalability challenges

PCM being researched as one promising alternative

Page 4: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Motivation However, PCM has several limitations:

Higher access latencies Higher read and write energy Limited write Endurance (107 – 108)

4Chhabra, Solihin – PCM Anomalous Behavior

Page 5: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Motivation

5Chhabra, Solihin – PCM Anomalous Behavior

Thrashing Last Level cache, causing a writeback every iteration

TTF = Cell Endurance * cycles per write

Attack on PCM only system

System Fails in 32 seconds

Page 6: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Motivation Wear Leveling Algorithms

FGWL: Fine Grained Wear Leveling Store blocks in a page in a rotated manner Works across page faults Security contingent on the OS swapping out the attack

application’s pages

6Chhabra, Solihin – PCM Anomalous Behavior

Page 7: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Motivation

7Chhabra, Solihin – PCM Anomalous Behavior

Wear Leveling Algorithms cannot protect against malicious behavior

Need a separate Anomaly Detection Mechanism

Start-Gap Wear Leveling Algorithm

Page 8: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Contributions Defining anomalous behavior for PCM based

systems. (Anomaly Detection Mechanism) Propose a hardware implementation to collect

these statistics reliably Show that complete replacement of DRAM with

PCM is not possible

8Chhabra, Solihin – PCM Anomalous Behavior

Page 9: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Related Work

9Chhabra, Solihin – PCM Anomalous Behavior

Bridging Latency Gap

Qureshi et al., Lee et al., Cho et al.B

rid

gin

g E

ne

rgy

Ga

p

Ch

o e

t a

l.,

Le

e e

t a

l.,

Zh

ou

et

al.

Incre

asing L

ifetim

e

Quresh

i et a

l., C

ho et a

l.,

Lee e

t al.,

Zhan

g et a

l.

Security

Page 10: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Experimental Setup Simics, Full system Simulator 4GHz, in-order processor Split L1 cache (32KB), 2-cycle latency Unified L2 (1MB), 10-cycle latency All caches have 64b block size and use LRU SPEC 2006 benchmarks: Skip 5B and simulate

200M instructions

10Chhabra, Solihin – PCM Anomalous Behavior

Page 11: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Anomaly Detection Mechanism Goals

Design a metric to define Anomalous behavior Provide for reliable collection of statistics to derive this

metric

11Chhabra, Solihin – PCM Anomalous Behavior

Page 12: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Writebacks Per Instruction (WPI) Intuition

Need multiple writebacks to cross the endurance limit of a cell resulting in a successful attack

Significantly more than regular applications

Claim Writebacks Per Instruction (WPI) can be used to

define anomalous behavior

12Chhabra, Solihin – PCM Anomalous Behavior

Page 13: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Writebacks Per Instruction (WPI)

Anomalous Behavior: An application with a WPI of more than the system WPI indicates potentially anomalous behavior

13Chhabra, Solihin – PCM Anomalous Behavior

Page 14: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Writebacks Per Instruction (WPI) However, this definition of anomaly can be broken

Conclusion: Seemingly useful metric, WPI, cannot be used to define anomalous behavior

14Chhabra, Solihin – PCM Anomalous Behavior

Insert one cycle instructions to get the WPI down

Brings WPI below System WPI but attack still succeeds in 32.78 seconds

Page 15: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Write Traffic Distribution (WTD) Intuition

Attacker needs to force writebacks to the same address repeatedly

High concentration of writes to a few lines could indicate anomalous behavior

Claim Write Traffic Distribution (WTD) could be used to

define anomalous behavior

15Chhabra, Solihin – PCM Anomalous Behavior

Page 16: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Write Traffic Distribution (WTD)

Anomalous Behavior: If the distribution favors one set of lines by more than α%, it indicates potential anomalous behavior

16Chhabra, Solihin – PCM Anomalous Behavior

Page 17: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Write Traffic Distribution (WTD) However, armed with knowledge of definition of

anomalous behavior, WTD can be bypassed Write to all lines of a page: Assuming 4KB page size

and 64byte block size, attack succeeds in 64X time (34 minutes)

Conclusion: Seemingly useful metric, WTD, cannot be used to define anomalous behavior

17Chhabra, Solihin – PCM Anomalous Behavior

Page 18: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Writeback Traffic Per Page (WTPP) A foolproof metric must incorporate two factors:

The number of writebacks (WPI) Set of addresses (WTD)

A successful attack application will make a large number of writebacks (WPI) to a fixed set of

addresses (WTD)

18Chhabra, Solihin – PCM Anomalous Behavior

Page 19: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Writeback Traffic Per Page (WTPP) Ideal PCM lifetime: 3 years

Plugging in, Writeback Traffic = 5.3GBPS For ideal lifetime, traffic should be uniform. This gives us a traffic of 1.2KBPS per page to

keep ideal lifetime

19Chhabra, Solihin – PCM Anomalous Behavior

Anomalous Behavior: A page receiving a WTPP of more than 1.2KBPS

Page 20: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Writeback Traffic Per Page (WTPP)

20Chhabra, Solihin – PCM Anomalous Behavior

Attacker can reduce the WTPP to less than 1.2KBPS

Conservative but needed to retain ideal lifetime

Page 21: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Hardware Implementation Need to collect stats reliably

Need to track writebacks to all pages

Low hardware overheads

21Chhabra, Solihin – PCM Anomalous Behavior

Page 22: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Hardware Implementation

22Chhabra, Solihin – PCM Anomalous Behavior

Page 23: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

PCM: Complete replacement for DRAM ?

We defined an Anomaly detection mechanism Once anomalous behavior is detected, a solution

must be in place to prevent against these attacks Killing apps not an option System must have some memory like DRAM

where pages exhibiting anomalous behavior can be remapped to

Hence, having DRAM portion required from both performance and reliability perspective

23Chhabra, Solihin – PCM Anomalous Behavior

Page 24: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Conclusions We defined anomalous behavior

Simple metrics like WPI and WTD can be bypassed by attackers

WTPP is a complete metric

Proposed a hardware implementation for the anomaly detection mechanism

Complete replacement of DRAM with PCM not feasible from both performance and reliability perspective

24Chhabra, Solihin – PCM Anomalous Behavior

Page 25: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Thank you

25Chhabra, Solihin – PCM Anomalous Behavior

Page 26: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Backup…

26Chhabra, Solihin – PCM Anomalous Behavior

Page 27: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.

Attack on hybrid memory system

27Chhabra, Solihin – PCM Anomalous Behavior

Lifetime of 24 days