When Things Heat Up: Detecting Malicious Activity Using CPU Thermal Sensors
Abstract
1. Introduction
- We evaluate the Hot-n-Cold [1] anomaly detection technique, showing its robustness in identifying code injections via thermal traces;
- We detect cryptographic ransomware activity, such as CryptoTrooper [2], by fingerprinting its thermal profile;
- We identify authorized and unauthorized system login attempts based on their unique thermal footprints.
Organization
2. Related Work
3. Materials and Methods
3.1. Environment and Methodology
3.1.1. Experimental Setup
3.1.2. Thermal Sensors
3.1.3. Baseline Temperature
3.1.4. The Scripts
3.1.5. Core Selection
3.1.6. The Noise
3.2. Evaluation of Hot-n-Cold
3.2.1. Hot-n-Cold
3.2.2. Evaluation
3.3. Fingerprinting CryptoTrooper
3.4. Fingerprinting Authentication Processes
- gnome-terminal -- bash -c ‘‘sshpass -p ’$password’ ssh -o
- StrictHostKeyChecking=no ${username}@${server_ip}; exec bash’’
- sshpass -p ‘‘$PASSWORD’’ ssh -o StrictHostKeyChecking=no ‘‘$USER@$HOST’’
- spawn su - $username -c ‘‘whoami’’
- With noise: one and two clients downloading the 1 KB image;
- With noise: from 5 clients (request the web page, download a 1 KB image, two 480 KB images, and two 1 MB images);
- With noise: from 30 clients (-client noise);
- Alternate passwords no noise: one correct and one wrong;
- Alternate passwords no noise: two correct and two wrong.
4. Results
4.1. Hot-n-Cold Evaluation
4.2. Fingerprinting CryptoTrooper
4.3. Fingerprinting Authentication Processes
5. Discussion
5.1. Limitations of the Proposed Approach
5.2. Differences in Cooling Systems
5.3. Hot-n-Cold Evaluation
5.4. Fingerprinting CryptoTrooper
5.5. Fingerprinting Authentication Processes
5.6. Future Work
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Appendix A.1. Fingerprinting CryptoTrooper
Appendix A.2. Fingerprinting Authentication Processes
References
- Vasilas, T.; Jakobsche, T.; Ciorba, F.M. Hot-n-Cold: Mapping the Syscall Attack Surface Using Thermal Side Channels, 2023. In Proceedings of the 2023 22nd International Symposium on Parallel and Distributed Computing (ISPDC), Bucharest, Romania, 10–12 July 2023. [Google Scholar]
- CryptoTrooper: The First Linux White-Box Ransomware for Learning Purpose. Available online: https://github.com/jdsecurity/CryptoTrooper/tree/master (accessed on 1 May 2025).
- Masti, R.J.; Rai, D.; Ranganathan, A.; Müller, C.; Thiele, L.; Capkun, S. Thermal covert channels on multi-core platforms. In Proceedings of the USENIX Security Symposium, Washington, DC, USA, 12–14 August 2015. [Google Scholar]
- Bartolini, D.B.; Miedl, P.; Thiele, L. On the capacity of thermal covert channels in multicores. In Proceedings of the Eleventh European Conference on Computer Systems, London, UK, 18–21 April 2016. [Google Scholar]
- Long, Z.; Wang, X.; Jiang, Y.; Cui, G.; Zhang, L.; Mak, T. Improving the efficiency of thermal covert channels in multi-/many-core systems. In Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), Dresden, Germany, 19–23 March 2018. [Google Scholar]
- Dey, S.; Singh, A.K.; McDonald-Maier, K. ThermalAttackNet: Are CNNs making it easy to perform temperature side-channel attack in mobile edge devices? Future Internet 2021, 13, 146. [Google Scholar] [CrossRef]
- Kim, T.; Shin, Y. ThermalBleed: A practical thermal side-channel attack. IEEE Access 2022, 10, 25718–25731. [Google Scholar] [CrossRef]
- Mishra, N.; Dutta, T.L.; Shukla, S.; Chakraborty, A.; Mukhopadhyay, D. Too hot to handle: Novel thermal side-channel in power attack-protected Intel processors. In Proceedings of the 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Tysons Corner, VA, USA, 6–9 May 2024. [Google Scholar]
- Allec, N.; Hassan, Z.; Shang, L.; Dick, R.P.; Yang, R. ThermalScope: Multi-scale thermal analysis for nanometer-scale integrated circuits. In Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design, San Jose, CA, USA, 10–13 November 2008. [Google Scholar]
- Gu, P.; Stow, D.; Barnes, R.; Kursun, E.; Xie, Y. Thermal-aware 3D design for side-channel information leakage. In Proceedings of the 2016 IEEE 34th International Conference on Computer Design (ICCD), Scottsdale, AZ, USA, 2–5 October 2016. [Google Scholar]
- Huang, H.; Wang, X.; Jiang, Y.; Singh, A.K.; Yang, M.; Huang, L. On countermeasures against the thermal covert channel attacks targeting many-core systems. In Proceedings of the 2020 57th ACM/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 20–24 July 2020. [Google Scholar]
- Huang, H.; Wang, X.; Jiang, Y.; Singh, A.K.; Yang, M.; Huang, L. Detection of and countermeasure against thermal covert channel in many-core systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2021, 41, 252–265. [Google Scholar] [CrossRef]
- Wu, Q.; Wang, X.; Chen, J. Defending against thermal covert channel attacks by task migration in many-core system. In Proceedings of the 2021 IEEE 3rd International Conference on Circuits and Systems (ICCS), Chengdu, China, 29–31 October 2021. [Google Scholar]
- Rahimi, P.; Singh, A.K.; Wang, X. Selective noise based power-efficient and effective countermeasure against thermal covert channel attacks in multi-core systems. J. Low Power Electron. Appl. 2022, 12, 25. [Google Scholar] [CrossRef]
- Wang, X.; Wang, S.; Jiang, Y.; Singh, A.K.; Yang, M.; Huang, L. Combating stealthy thermal covert channel attack with its thermal signal transmitted in direct sequence spread spectrum. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2022, 41, 4064–4075. [Google Scholar] [CrossRef]
- Wang, X.; Huang, H.; Chen, R.; Jiang, Y.; Singh, A.K.; Yang, M.; Huang, L. Detection of thermal covert channel attacks based on classification of components of the thermal signal features. IEEE Trans. Comput. 2022, 72, 971–983. [Google Scholar] [CrossRef]
- González-Gómez, J.; Sikal, M.B.; Khdr, H.; Bauer, L.; Henkel, J. Smart detection of obfuscated thermal covert channel attacks in many-core processors. In Proceedings of the 2023 60th ACM/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 9–13 July 2023. [Google Scholar]
- Vasilas, T.; Bacila, C.; Brad, R. Beat the Heat: Syscall Attack Detection via Thermal Side Channel. Future Internet 2024, 16, 301. [Google Scholar] [CrossRef]
- Ling, X.; Wu, L.; Zhang, J.; Qu, Z.; Deng, W.; Chen, X.; Qian, Y.; Wu, C.; Ji, S.; Luo, T.; et al. Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. Comput. Secur. 2023, 128, 103134. [Google Scholar] [CrossRef]
- Intel® Core™ i7-10700F Processor. Available online: https://www.intel.com/content/www/us/en/products/sku/199318/intel-core-i710700f-processor-16m-cache-up-to-4-80-ghz/specifications.html (accessed on 7 June 2025).
- Intel® Core™ i7-13700 Processor. Available online: https://www.intel.com/content/www/us/en/products/sku/230490/intel-core-i713700-processor-30m-cache-up-to-5-20-ghz/specifications.html (accessed on 7 June 2025).
- Intel® Core™ i9-11900K Processor. Available online: https://www.intel.com/content/www/us/en/products/sku/212325/intel-core-i911900k-processor-16m-cache-up-to-5-30-ghz/specifications.html (accessed on 7 June 2025).
- Kernel driver coretemp. Available online: https://docs.kernel.org/hwmon/coretemp.html (accessed on 30 May 2025).
- Intel® 64 and IA-32 Architectures Software Developer’s Manual Combined Volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D, and 4. 2023. Available online: https://www.intel.com/content/www/us/en/content-details/782158/intel-64-and-ia-32-architectures-software-developer-s-manual-combined-volumes-1-2a-2b-2c-2d-3a-3b-3c-3d-and-4.html?wapkw=intel%2064%20and%20ia-32%20architectures%20software%20developer%27s%20manual&docid=782158 (accessed on 13 June 2025).
- The Linux Kernel Archives. 2024. Available online: https://www.kernel.org/doc/Documentation/hwmon/sysfs-interface (accessed on 13 June 2025).
- stress-ng. Available online: https://github.com/ColinIanKing/stress-ng (accessed on 30 May 2025).
- Intel Core i9-11900K and Core i5-11600K Review: Rocket Lake Blasts Off. Available online: https://www.tomshardware.com/reviews/intel-core-i9-11900k-and-i5-11600k-review (accessed on 7 June 2025).
- Apache HTTP Server Project. Available online: https://httpd.apache.org/ (accessed on 1 June 2025).
- Common Vulnerabilities and Exposures. Available online: https://www.cve.org/ (accessed on 30 May 2025).
- GNU Core Utilities. Available online: https://github.com/coreutils/coreutils (accessed on 25 November 2024).
- OpenSSL: The Open Source Toolkit for SSL/TLS. Available online: https://www.openssl.org/ (accessed on 1 June 2025).
- ssh—Linux Manual Page. Available online: https://man7.org/linux/man-pages/man1/ssh.1.html (accessed on 30 May 2025).
- OpenSSH Server. Available online: https://documentation.ubuntu.com/server/how-to/security/openssh-server/index.html (accessed on 1 June 2025).
- Random.org. Available online: https://www.random.org/ (accessed on 1 June 2025).
Features Techniques | Hot-n-Cold [1] | Beat-the-Heat [18] | When Things Heat Up (Current Article) |
---|---|---|---|
Methodology | Command was executed 300 times with three different time gaps between calls: 10 ms, 100 ms, and 1000 ms. | Command was executed 600 times with one time gap between calls: 10 ms. | Command was executed 600 times with one time gap between calls: 10 ms. |
Noise | No noise | User-like noise: moving files, performing extended math computations, playing songs, browsing the web. | Server-like noise: Download web page and images of 1 KB, 480 KB and 1 MB in size, requested by one or multiple clients. |
Number of collected traces | 30 | 50 | 50 |
Processor types | Intel Xeon E5-2640 v4 | Intel Core i7-10700F, i5-4590, Intel Xeon W3550 | Intel Core i7-10700F, i7-13700, i9-11900K (Minimal results: Notebook Intel Core i7-13700H, Desktop AMD Ryzen 7 5700G) |
Results | 0.73–0.83 Pearson correlation index, 0.5–1 °C differences | 0.66–0.98 Pearson correlation index, 0.2–2 °C differences | 0.93–0.99 Pearson correlation index, 0.03–0.8 °C differences |
Factor | Fan (i7) | Liquid (i9) |
---|---|---|
Cooling latency | Higher | Lower |
Heat spread | Localized | Diffused |
Cooling speed | Slower to react | Faster and dissipates heat more evenly |
Temperature spikes | Allow sharp curves in temperature | Flattens temperature spikes |
Background tasks | Fewer | More |
Temperature signal | Clear | Noisy |
Feature | ssh with Terminal | ssh Without Terminal |
---|---|---|
Opens a new terminal window? | Yes | No |
Launches full user shell (e.g., bash)? | Yes | Only minimal shell setup |
Allocates a full terminal? | Yes | No (unless forced manually) |
Can accept multiple commands? | Yes | No |
Stays connected? | Yes, until you exit | No, disconnects automatically |
Resource usage | Higher | Lower |
Feature | ssh | su |
---|---|---|
Encrypts connection? | Yes | No |
Sends password over network? | Yes, encrypted | No |
Exposed to network attacks? | Yes, if misconfigured | No, only local risks |
User environment? | Full remote | Local user |
CPU Usage | Higher, due to encryption/decryption | Very low, just basic hash computation |
Memory usage | More, holds encryption keys, session buffers, etc. | Minimal, only password in memory temporarily |
Time delay | Higher, due to encryption + authentication handshake | Fast, only local password check |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Vasilas, T.; Brad, R. When Things Heat Up: Detecting Malicious Activity Using CPU Thermal Sensors. J. Cybersecur. Priv. 2025, 5, 56. https://doi.org/10.3390/jcp5030056
Vasilas T, Brad R. When Things Heat Up: Detecting Malicious Activity Using CPU Thermal Sensors. Journal of Cybersecurity and Privacy. 2025; 5(3):56. https://doi.org/10.3390/jcp5030056
Chicago/Turabian StyleVasilas, Teodora, and Remus Brad. 2025. "When Things Heat Up: Detecting Malicious Activity Using CPU Thermal Sensors" Journal of Cybersecurity and Privacy 5, no. 3: 56. https://doi.org/10.3390/jcp5030056
APA StyleVasilas, T., & Brad, R. (2025). When Things Heat Up: Detecting Malicious Activity Using CPU Thermal Sensors. Journal of Cybersecurity and Privacy, 5(3), 56. https://doi.org/10.3390/jcp5030056