Paper 2025/014
SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity
Abstract
The Performance Monitoring Unit (PMU), a standard feature in all modern computing systems, presents significant security risks by leaking sensitive user activities through microarchitectural event data. This work demonstrates the feasibility of remote side-channel attacks leveraging PMU data, revealing vulnerabilities that compromise user privacy and enable covert surveillance without physical access to the target machine. By analyzing the PMU feature space, we create distinct micro-architectural fingerprints for benchmark applications, which are then utilized in machine learning (ML) models to detect the corresponding benchmarks. This approach allows us to build a pre-trained model for benchmark detection using the unique micro-architectural fingerprints derived from PMU data. Subsequently, when an attacker remotely accesses the victim’s PMU data, the pre-trained model enables the identification of applications used by the victim with high accuracy. In our proof-of-concept demonstration, the pre-trained model successfully identifies applications used by a victim when the attacker remotely accesses PMU data, showcasing the potential for malicious exploitation of PMU data. We analyze stress-ng benchmarks and build our classifiers using logistic regression, decision tree, k-nearest neighbors, and random forest ML models. Our proposed models achieve an average prediction accuracy of 98%, underscoring the potential risks associated with remote side-channel analysis using PMU data and emphasizing the need for more robust safeguards. This work underscores the urgent need for robust countermeasures to protect against such vulnerabilities and provides a foundation for future research in micro-architectural security.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- CybersecurityMicroarchitectural SecuritySide-Channel AnalysisApplication FingerprintingPMUHPC
- Contact author(s)
-
mdkawser bepary @ ufl edu
arunabhobasu @ ufl edu
mlnu @ ufl edu
rhassan1 @ ufl edu
farimah @ ece ufl edu
tehranipoor @ ece ufl edu - History
- 2025-01-06: approved
- 2025-01-03: received
- See all versions
- Short URL
- https://ia.cr/2025/014
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/014, author = {Md Kawser Bepary and Arunabho Basu and Sajeed Mohammad and Rakibul Hassan and Farimah Farahmandi and Mark Tehranipoor}, title = {{SPY}-{PMU}: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/014}, year = {2025}, url = {https://eprint.iacr.org/2025/014} }