ground noise, which could make the side channel in-
feasible, or at least far more difficult to interpret.
We have performed initial testing with some back-
ground noise conditions, and the results are visually
quite similar to the ideal case. However, a far more
extensive exploration should be done before draw-
ing any conclusions about the effectiveness of this
side channel in a typical enterprise computing envi-
ronment with multiple servers running. To explore
this further, we intend to repeat similar experiments
with various tasks running in the background on vir-
tual machines on other servers. By steadily increasing
the background noise during the experiment, we can
identify at what point the side channel becomes sig-
nificantly noisier, or altogether infeasible.
5.2 Covert Channel
Related to side channel investigations, future work
could also explore the viability of creating a covert
communication channel via power analysis. Given
the experimental results achieved so far, it is possi-
ble that information could be encoded using the high
and low states seen in the spectrogram. With an ap-
propriate encoding scheme, a relatively efficient sys-
tem could be designed to covertly transmit informa-
tion by modulating the power consumption such that
the high and low states represent binary data. The
communication rate could be enhanced by using a
ternary encoding scheme, where the power consump-
tion is modulated between three states, corresponding
to: idle, 50%, and 100% CPU utilization. While we
did perform some testing of this idea (as seen in figure
6), we intend to design further experiments, and in-
vestigate encoding schemes and data processing tech-
niques for extracting information from the signal, in
order to more thoroughly investigate the viability of
the concept.
REFERENCES
Chen, K.-Y., Cohn, G. A., Gupta, S., and Patel, S. N. (2013).
utouch: sensing touch gestures on unmodified lcds.
In Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, pages 2581–2584.
Enev, M., Gupta, S., Kohno, T., and Patel, S. N. (2011).
Televisions, video privacy, and powerline electromag-
netic interference. In Proceedings of the 18th ACM
conference on Computer and communications secu-
rity, pages 537–550.
Golder, A., Das, D., Danial, J., Ghosh, S., Sen, S., and Ray-
chowdhury, A. (2019). Practical approaches toward
deep-learning-based cross-device power side-channel
attack. IEEE Transactions on Very Large Scale Inte-
gration (VLSI) Systems, 27(12):2720–2733.
Gupta, S., Chen, K.-Y., Reynolds, M. S., and Patel, S. N.
(2011). Lightwave: using compact fluorescent lights
as sensors. In Proceedings of the 13th international
conference on Ubiquitous computing, pages 65–74.
Gupta, S., Reynolds, M. S., and Patel, S. N. (2010). Elec-
trisense: Single-point sensing using emi for electri-
cal event detection and classification in the home. In
Proceedings of the 12th ACM International Confer-
ence on Ubiquitous Computing, UbiComp ’10, page
139–148, New York, NY, USA. Association for Com-
puting Machinery.
Harris, C. R., Millman, K. J., van der Walt, S. J., Gommers,
R., Virtanen, P., Cournapeau, D., Wieser, E., Taylor,
J., Berg, S., Smith, N. J., Kern, R., Picus, M., Hoyer,
S., van Kerkwijk, M. H., Brett, M., Haldane, A., del
R
´
ıo, J. F., Wiebe, M., Peterson, P., G
´
erard-Marchant,
P., Sheppard, K., Reddy, T., Weckesser, W., Abbasi,
H., Gohlke, C., and Oliphant, T. E. (2020). Array pro-
gramming with NumPy. Nature, 585(7825):357–362.
Hunter, J. D. (2007). Matplotlib: A 2d graphics environ-
ment. Computing in Science & Engineering, 9(3):90–
95.
Khan, H. A., Sehatbakhsh, N., Nguyen, L. N., Prvulovic,
M., and Zaji
´
c, A. (2019). Malware detection in em-
bedded systems using neural network model for elec-
tromagnetic side-channel signals. Journal of Hard-
ware and Systems Security, 3(4):305–318.
Kocher, P., Jaffe, J., and Jun, B. (1999). Differential power
analysis. In Wiener, M., editor, Advances in Cryptol-
ogy — CRYPTO’ 99, pages 388–397, Berlin, Heidel-
berg. Springer Berlin Heidelberg.
Lipp, M., Kogler, A., Oswald, D., Schwarz, M., Easdon,
C., Canella, C., and Gruss, D. (2021). Platypus:
Software-based power side-channel attacks on x86. In
2021 IEEE Symposium on Security and Privacy (SP),
pages 355–371.
McFee, B., Raffel, C., Liang, D., Ellis, D. P. W., McVicar,
M., Battenberg, E., and Nieto, O. (2015). librosa: Au-
dio and music signal analysis in python.
Patel, S. N., Robertson, T., Kientz, J. A., Reynolds, M. S.,
and Abowd, G. D. (2007). At the flick of a switch: De-
tecting and classifying unique electrical events on the
residential power line (nominated for the best paper
award). In International Conference on Ubiquitous
Computing, pages 271–288. Springer.
Szefer, J. (2019). Survey of microarchitectural side and
covert channels, attacks, and defenses. Journal of
Hardware and Systems Security, 3(3):219–234.
Taylor, M. A., Larson, E. C., and Thornton, M. A. (2021).
Rapid ransomware detection through side channel ex-
ploitation. In 2021 IEEE International Conference on
Cyber Security and Resilience (CSR), pages 47–54.
Data Leakage in Isolated Virtualized Enterprise Computing Systems
123