Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical...
-
Upload
richard-anthony -
Category
Documents
-
view
217 -
download
3
Transcript of Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical...
![Page 1: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/1.jpg)
Defining Anomalous Behavior for Phase Change Memory
Siddhartha Chhabra and Yan Solihin
Electrical and Computer EngineeringNorth Carolina State University
WEST-2010
![Page 2: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/2.jpg)
2
Outline Defining Anomalous Behavior
Motivation Related Work Experimental Setup Anomaly Detection Mechanism
Writebacks Per Instruction (WPI) Write Traffic Distribution (WTD) Writeback Traffic Per Page (WTPP) Hardware Implementation
PCM, a replacement for DRAM ? Conclusions
Chhabra, Solihin – PCM Anomalous Behavior
![Page 3: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/3.jpg)
Motivation
3Chhabra, Solihin – PCM Anomalous Behavior
Core
A
Main Memory
DISK
CoreCore
AA
Horizontal Expansion
Vertical Expansion
Main Memory
However:DRAM faces cost, energy and scalability challenges
PCM being researched as one promising alternative
![Page 4: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/4.jpg)
Motivation However, PCM has several limitations:
Higher access latencies Higher read and write energy Limited write Endurance (107 – 108)
4Chhabra, Solihin – PCM Anomalous Behavior
![Page 5: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/5.jpg)
Motivation
5Chhabra, Solihin – PCM Anomalous Behavior
Thrashing Last Level cache, causing a writeback every iteration
TTF = Cell Endurance * cycles per write
Attack on PCM only system
System Fails in 32 seconds
![Page 6: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/6.jpg)
Motivation Wear Leveling Algorithms
FGWL: Fine Grained Wear Leveling Store blocks in a page in a rotated manner Works across page faults Security contingent on the OS swapping out the attack
application’s pages
6Chhabra, Solihin – PCM Anomalous Behavior
![Page 7: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/7.jpg)
Motivation
7Chhabra, Solihin – PCM Anomalous Behavior
Wear Leveling Algorithms cannot protect against malicious behavior
Need a separate Anomaly Detection Mechanism
Start-Gap Wear Leveling Algorithm
![Page 8: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/8.jpg)
Contributions Defining anomalous behavior for PCM based
systems. (Anomaly Detection Mechanism) Propose a hardware implementation to collect
these statistics reliably Show that complete replacement of DRAM with
PCM is not possible
8Chhabra, Solihin – PCM Anomalous Behavior
![Page 9: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/9.jpg)
Related Work
9Chhabra, Solihin – PCM Anomalous Behavior
Bridging Latency Gap
Qureshi et al., Lee et al., Cho et al.B
rid
gin
g E
ne
rgy
Ga
p
Ch
o e
t a
l.,
Le
e e
t a
l.,
Zh
ou
et
al.
Incre
asing L
ifetim
e
Quresh
i et a
l., C
ho et a
l.,
Lee e
t al.,
Zhan
g et a
l.
Security
![Page 10: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/10.jpg)
Experimental Setup Simics, Full system Simulator 4GHz, in-order processor Split L1 cache (32KB), 2-cycle latency Unified L2 (1MB), 10-cycle latency All caches have 64b block size and use LRU SPEC 2006 benchmarks: Skip 5B and simulate
200M instructions
10Chhabra, Solihin – PCM Anomalous Behavior
![Page 11: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/11.jpg)
Anomaly Detection Mechanism Goals
Design a metric to define Anomalous behavior Provide for reliable collection of statistics to derive this
metric
11Chhabra, Solihin – PCM Anomalous Behavior
![Page 12: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/12.jpg)
Writebacks Per Instruction (WPI) Intuition
Need multiple writebacks to cross the endurance limit of a cell resulting in a successful attack
Significantly more than regular applications
Claim Writebacks Per Instruction (WPI) can be used to
define anomalous behavior
12Chhabra, Solihin – PCM Anomalous Behavior
![Page 13: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/13.jpg)
Writebacks Per Instruction (WPI)
Anomalous Behavior: An application with a WPI of more than the system WPI indicates potentially anomalous behavior
13Chhabra, Solihin – PCM Anomalous Behavior
![Page 14: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/14.jpg)
Writebacks Per Instruction (WPI) However, this definition of anomaly can be broken
Conclusion: Seemingly useful metric, WPI, cannot be used to define anomalous behavior
14Chhabra, Solihin – PCM Anomalous Behavior
Insert one cycle instructions to get the WPI down
Brings WPI below System WPI but attack still succeeds in 32.78 seconds
![Page 15: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/15.jpg)
Write Traffic Distribution (WTD) Intuition
Attacker needs to force writebacks to the same address repeatedly
High concentration of writes to a few lines could indicate anomalous behavior
Claim Write Traffic Distribution (WTD) could be used to
define anomalous behavior
15Chhabra, Solihin – PCM Anomalous Behavior
![Page 16: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/16.jpg)
Write Traffic Distribution (WTD)
Anomalous Behavior: If the distribution favors one set of lines by more than α%, it indicates potential anomalous behavior
16Chhabra, Solihin – PCM Anomalous Behavior
![Page 17: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/17.jpg)
Write Traffic Distribution (WTD) However, armed with knowledge of definition of
anomalous behavior, WTD can be bypassed Write to all lines of a page: Assuming 4KB page size
and 64byte block size, attack succeeds in 64X time (34 minutes)
Conclusion: Seemingly useful metric, WTD, cannot be used to define anomalous behavior
17Chhabra, Solihin – PCM Anomalous Behavior
![Page 18: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/18.jpg)
Writeback Traffic Per Page (WTPP) A foolproof metric must incorporate two factors:
The number of writebacks (WPI) Set of addresses (WTD)
A successful attack application will make a large number of writebacks (WPI) to a fixed set of
addresses (WTD)
18Chhabra, Solihin – PCM Anomalous Behavior
![Page 19: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/19.jpg)
Writeback Traffic Per Page (WTPP) Ideal PCM lifetime: 3 years
Plugging in, Writeback Traffic = 5.3GBPS For ideal lifetime, traffic should be uniform. This gives us a traffic of 1.2KBPS per page to
keep ideal lifetime
19Chhabra, Solihin – PCM Anomalous Behavior
Anomalous Behavior: A page receiving a WTPP of more than 1.2KBPS
![Page 20: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/20.jpg)
Writeback Traffic Per Page (WTPP)
20Chhabra, Solihin – PCM Anomalous Behavior
Attacker can reduce the WTPP to less than 1.2KBPS
Conservative but needed to retain ideal lifetime
![Page 21: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/21.jpg)
Hardware Implementation Need to collect stats reliably
Need to track writebacks to all pages
Low hardware overheads
21Chhabra, Solihin – PCM Anomalous Behavior
![Page 22: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/22.jpg)
Hardware Implementation
22Chhabra, Solihin – PCM Anomalous Behavior
![Page 23: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/23.jpg)
PCM: Complete replacement for DRAM ?
We defined an Anomaly detection mechanism Once anomalous behavior is detected, a solution
must be in place to prevent against these attacks Killing apps not an option System must have some memory like DRAM
where pages exhibiting anomalous behavior can be remapped to
Hence, having DRAM portion required from both performance and reliability perspective
23Chhabra, Solihin – PCM Anomalous Behavior
![Page 24: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/24.jpg)
Conclusions We defined anomalous behavior
Simple metrics like WPI and WTD can be bypassed by attackers
WTPP is a complete metric
Proposed a hardware implementation for the anomaly detection mechanism
Complete replacement of DRAM with PCM not feasible from both performance and reliability perspective
24Chhabra, Solihin – PCM Anomalous Behavior
![Page 25: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/25.jpg)
Thank you
25Chhabra, Solihin – PCM Anomalous Behavior
![Page 26: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/26.jpg)
Backup…
26Chhabra, Solihin – PCM Anomalous Behavior
![Page 27: Defining Anomalous Behavior for Phase Change Memory Siddhartha Chhabra and Yan Solihin Electrical and Computer Engineering North Carolina State University.](https://reader035.fdocuments.in/reader035/viewer/2022062801/56649e4e5503460f94b4486e/html5/thumbnails/27.jpg)
Attack on hybrid memory system
27Chhabra, Solihin – PCM Anomalous Behavior
Lifetime of 24 days