skip to main content
10.1145/3565053.3565065acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmemsysConference Proceedingsconference-collections
short-paper

Toward Classification of Phase Change Memory and 3D NAND Flash SSDs Using Power-based Side-channel Analysis in the Time-domain

Published:20 September 2023Publication History

ABSTRACT

Intel first introduced their new phase change memory technology (Optane™) to the market in the form of a solid state drive (SSD), which has not been widely investigated for potential vulnerability to side-channel analysis and attack. Like their NAND flash SSD counterparts, the firmware on an Optane SSD has the potential to make it difficult for the user to validate whether operations (e.g., read and write) are being performed as expected on the drive itself. Machine learning-based classification has proven to be a useful tool in validating embedded firmware operations and uncovering unanticipated behavior. In this work, we describe our initial results in an ongoing investigation into the feasibility of using current-draw to analyze the power side-channel in the first commercially available phase change memory technology, the Intel® Optane™. We used time-domain features from our power-based side-channel analysis to compare seven different solid state drives across different technologies (3D XPoint™/Phase Change Memory and 3D NAND Flash), interfaces (Serial "Advanced Technology" Attachment III and Peripheral Component Interconnect Express 3.0 w/ Non-Volatile Memory Express), and form factors (2.5" and M.2), and presented time domain power signatures for both read and write operations. We examined the average power associated with the longest activity pulse for each of these drives and operations, compared them, and highlighted differences across drives of various technologies and interfaces. In doing so, we demonstrated that classifying these drives based on the combination of read and write longest pulse average power is feasible.

References

  1. MF Beug. 2013. NAND Flash Technology. In Inside Solid State Drives (SSDs). Springer, 79–126.Google ScholarGoogle Scholar
  2. Dane Brown, Owens Walker, Ryan Rakvic, Robert W Ives, Hau Ngo, James Shey, and Justin Blanco. 2018. Towards detection of modified firmware on solid state drives via side channel analysis. In Proceedings of the International Symposium on Memory Systems. 315–320.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dane Brown, T Owens Walker III, Justin A Blanco, Robert W Ives, Hau T Ngo, James Shey, and Ryan Rakvic. 2021. Detecting firmware modification on solid state drives via current draw analysis. Computers & Security 102 (2021), 102149.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Geoffrey W Burr, Matthew J Breitwisch, Michele Franceschini, Davide Garetto, Kailash Gopalakrishnan, Bryan Jackson, Bülent Kurdi, Chung Lam, Luis A Lastras, Alvaro Padilla, 2010. Phase change memory technology. Journal of Vacuum Science & Technology B, Nanotechnology and Microelectronics: Materials, Processing, Measurement, and Phenomena 28, 2 (2010), 223–262.Google ScholarGoogle ScholarCross RefCross Ref
  5. Geoffrey W Burr, Matthew J Brightsky, Abu Sebastian, Huai-Yu Cheng, Jau-Yi Wu, Sangbum Kim, Norma E Sosa, Nikolaos Papandreou, Hsiang-Lan Lung, Haralampos Pozidis, 2016. Recent progress in phase-change memory technology. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 6, 2(2016), 146–162.Google ScholarGoogle ScholarCross RefCross Ref
  6. JonPaul Canclini, James McMasters, James Shey, Owens Walker, Ryan Rakvic, Hau Ngo, and Kevin D Fairbanks. 2016. Inferring read and write operations of solid-state drives based on energy consumption. In 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 1–6.Google ScholarGoogle Scholar
  7. Md Hafizul Islam Chowdhuryy, Rickard Ewetz, Amro Awad, and Fan Yao. 2021. Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories. In 2021 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 22–28.Google ScholarGoogle Scholar
  8. K Eshghi and Rino Micheloni. 2013. SSD architecture and PCI Express interface. In Inside solid state drives (SSDs). Springer, 19–45.Google ScholarGoogle Scholar
  9. Scott W Fong, Christopher M Neumann, and H-S Philip Wong. 2017. Phase-change memory—Towards a storage-class memory. IEEE Transactions on Electron Devices 64, 11 (2017), 4374–4385.Google ScholarGoogle ScholarCross RefCross Ref
  10. Frank T Hady, Annie Foong, Bryan Veal, and Dan Williams. 2017. Platform storage performance with 3D XPoint technology. Proc. IEEE 105, 9 (2017), 1822–1833.Google ScholarGoogle ScholarCross RefCross Ref
  11. Kangqiao Hu, Abdullah Nazma Nowroz, Sherief Reda, and Farinaz Koushanfar. 2013. High-sensitivity hardware trojan detection using multimodal characterization. In 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1271–1276.Google ScholarGoogle Scholar
  12. Zachary Johnson, Alex Varon, Justin Blanco, Ryan Rakvic, James Shey, Hau Ngo, Dane Brown, and Owens Walker. 2018. Classifying solid state drive firmware via side-channel current draw analysis. In 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, 943–948.Google ScholarGoogle Scholar
  13. Mohammad Nasim Imtiaz Khan, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay, and Swaroop Ghosh. 2021. Comprehensive study of side-channel attack on emerging non-volatile memories. Journal of Low Power Electronics and Applications 11, 4(2021), 38.Google ScholarGoogle ScholarCross RefCross Ref
  14. Paul Kocher, Jann Horn, Anders Fogh, , Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P’19).Google ScholarGoogle Scholar
  15. Paul C Kocher. 1996. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Annual International Cryptology Conference. Springer, 104–113.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18).Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yangdi Lyu and Prabhat Mishra. 2019. Efficient test generation for Trojan detection using side channel analysis. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 408–413.Google ScholarGoogle Scholar
  18. Jacob Melton, Ryan Rakvic, James Shey, Hau Ngo, Owens Walker, Justin Blanco, Dane Brown, Luke McDowell, and Kevin D Fairbanks. 2017. Inferring file system of solid state drives based on current consumption. In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 72–76.Google ScholarGoogle ScholarCross RefCross Ref
  19. Seetharam Narasimhan, Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis G Wolff, Christos A Papachristou, Kaushik Roy, and Swarup Bhunia. 2012. Hardware Trojan detection by multiple-parameter side-channel analysis. IEEE Transactions on computers 62, 11 (2012), 2183–2195.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Luong N Nguyen, Chia-Lin Cheng, Milos Prvulovic, and Alenka Zajić. 2019. Creating a backscattering side channel to enable detection of dormant hardware trojans. IEEE transactions on very large scale integration (VLSI) systems 27, 7(2019), 1561–1574.Google ScholarGoogle ScholarCross RefCross Ref
  21. Abdullah Nazma Nowroz, Kangqiao Hu, Farinaz Koushanfar, and Sherief Reda. 2014. Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 33, 12(2014), 1792–1805.Google ScholarGoogle ScholarCross RefCross Ref
  22. James Shey, Justin A Blanco, Owens Walker, Thomas W Tedesso, Hau T Ngo, Ryan Rakvic, and Kevin D Fairbanks. 2018. Monitoring device current to characterize trim operations of solid-state drives. IEEE Transactions on Information Forensics and Security 14, 5(2018), 1296–1306.Google ScholarGoogle ScholarCross RefCross Ref
  23. James Shey, Ryan Rakvic, Hau Ngo, Owens Walker, Thomas Tedesso, Justin A Blanco, and Kevin Fairbanks. 2016. Inferring trimming activity of solid-state drives based on energy consumption. In 2016 IEEE International Instrumentation and Measurement Technology Conference Proceedings. IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  24. T Owens Walker, Justin A Blanco, Ryan Rakvic, Ann Vanleer, Dane Brown, James Shey, Gregory L Sinsley, Hau T Ngo, and Robert W Ives. 2020. Classifying Proprietary Firmware on a Solid State Drive Using Idle State Current Draw Measurements. IEEE Access 8(2020), 31869–31881.Google ScholarGoogle ScholarCross RefCross Ref
  25. Greg Wong. 2013. SSD market overview. In Inside Solid State Drives (SSDs). Springer, 1–17.Google ScholarGoogle Scholar
  26. Lei Xu, Weidong Shi, and Nicholas Desalvo. 2014. Seasoning effect based side channel attacks to AES implementation with phase change memory. In Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy. 1–8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jinfeng Yang, Bingzhe Li, and David J Lilja. 2020. Exploring Performance Characteristics of the Optane 3D Xpoint Storage Technology. ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS) 5, 1 (2020), 1–28.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Toward Classification of Phase Change Memory and 3D NAND Flash SSDs Using Power-based Side-channel Analysis in the Time-domain

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              MEMSYS '22: Proceedings of the 2022 International Symposium on Memory Systems
              October 2022
              110 pages
              ISBN:9781450398008
              DOI:10.1145/3565053

              Copyright © 2022 ACM

              Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 20 September 2023

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper
              • Research
              • Refereed limited
            • Article Metrics

              • Downloads (Last 12 months)26
              • Downloads (Last 6 weeks)6

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format