Paper 2025/014

SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity

Md Kawser Bepary, University of Florida
Arunabho Basu, University of Florida
Sajeed Mohammad, University of Florida
Rakibul Hassan, University of Florida
Farimah Farahmandi, University of Florida
Mark Tehranipoor, University of Florida
Abstract

The Performance Monitoring Unit (PMU), a standard feature in all modern computing systems, presents significant security risks by leaking sensitive user activities through microarchitectural event data. This work demonstrates the feasibility of remote side-channel attacks leveraging PMU data, revealing vulnerabilities that compromise user privacy and enable covert surveillance without physical access to the target machine. By analyzing the PMU feature space, we create distinct micro-architectural fingerprints for benchmark applications, which are then utilized in machine learning (ML) models to detect the corresponding benchmarks. This approach allows us to build a pre-trained model for benchmark detection using the unique micro-architectural fingerprints derived from PMU data. Subsequently, when an attacker remotely accesses the victim’s PMU data, the pre-trained model enables the identification of applications used by the victim with high accuracy. In our proof-of-concept demonstration, the pre-trained model successfully identifies applications used by a victim when the attacker remotely accesses PMU data, showcasing the potential for malicious exploitation of PMU data. We analyze stress-ng benchmarks and build our classifiers using logistic regression, decision tree, k-nearest neighbors, and random forest ML models. Our proposed models achieve an average prediction accuracy of 98%, underscoring the potential risks associated with remote side-channel analysis using PMU data and emphasizing the need for more robust safeguards. This work underscores the urgent need for robust countermeasures to protect against such vulnerabilities and provides a foundation for future research in micro-architectural security.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
CybersecurityMicroarchitectural SecuritySide-Channel AnalysisApplication FingerprintingPMUHPC
Contact author(s)
mdkawser bepary @ ufl edu
arunabhobasu @ ufl edu
mlnu @ ufl edu
rhassan1 @ ufl edu
farimah @ ece ufl edu
tehranipoor @ ece ufl edu
History
2025-01-06: approved
2025-01-03: received
See all versions
Short URL
https://ia.cr/2025/014
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/014,
      author = {Md Kawser Bepary and Arunabho Basu and Sajeed Mohammad and Rakibul Hassan and Farimah Farahmandi and Mark Tehranipoor},
      title = {{SPY}-{PMU}: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/014},
      year = {2025},
      url = {https://eprint.iacr.org/2025/014}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.