{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:06Z","timestamp":1750221366804,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,10,11]],"date-time":"2017-10-11T00:00:00Z","timestamp":1507680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMETRICS Perform. Eval. Rev."],"published-print":{"date-parts":[[2017,10,11]]},"abstract":"<jats:p>Oversubscription increases the utilization of expensive power infrastructure in multi-tenant data centers, but it can create dangerous emergencies and outages if the designed power capacity is exceeded. Despite the safeguards in place today to prevent power outages, this extended abstract demonstrates that multi-tenant data centers are vulnerable to well-timed power attacks launched by a malicious tenant (i.e., attacker). Further, we show that there is a physical side channel -- a thermal side channel due to hot air recirculation -- that contains information about the benign tenants' runtime power usage. We develop a state-augmented Kalman filter that guides an attacker to precisely time its power attacks at moments that coincide with the benign tenants' high power demand, thus overloading the designed power capacity. Our experimental results show that an attacker can capture 53% of all attack opportunities, significantly compromising the data center availability.<\/jats:p>","DOI":"10.1145\/3152042.3152070","type":"journal-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T12:52:50Z","timestamp":1507812770000},"page":"91-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A First Look at Power Attacks in Multi-Tenant Data Centers"],"prefix":"10.1145","volume":"45","author":[{"given":"Mohammad A.","family":"Islam","sequence":"first","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Shaolei","family":"Ren","sequence":"additional","affiliation":[{"name":"University of California, Riverside"}]},{"given":"Adam","family":"Wierman","sequence":"additional","affiliation":[{"name":"California Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2017,10,11]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"CNN. Delta: 5-hour computer outage cost us $150 million. Sep. 07 2016.  CNN. Delta: 5-hour computer outage cost us $150 million. Sep. 07 2016."},{"key":"e_1_2_1_2_1","unstructured":"Colocation America. Data center standards (Tiers I-IV). 2017 https:\/\/www.colocationamerica.com\/data-center\/tier-standards-overview.htm.  Colocation America. Data center standards (Tiers I-IV). 2017 https:\/\/www.colocationamerica.com\/data-center\/tier-standards-overview.htm."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2427631.2427633"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.50"},{"key":"e_1_2_1_6_1","unstructured":"Uptime Institute. Data center industry survey 2014.  Uptime Institute. Data center industry survey 2014."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23235"}],"container-title":["ACM SIGMETRICS Performance Evaluation Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152042.3152070","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152042.3152070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:26Z","timestamp":1750213586000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152042.3152070"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,11]]},"references-count":6,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,10,11]]}},"alternative-id":["10.1145\/3152042.3152070"],"URL":"https:\/\/doi.org\/10.1145\/3152042.3152070","relation":{},"ISSN":["0163-5999"],"issn-type":[{"type":"print","value":"0163-5999"}],"subject":[],"published":{"date-parts":[[2017,10,11]]},"assertion":[{"value":"2017-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}