4.6 Article

Side Channel Attacks on GPUs

Journal

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 18, Issue 4, Pages 1950-1961

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2944624

Keywords

Graphics processing units; Graphics; Kernel; Instruction sets; Timing; Engines; Computer architecture; GPU; side channels; website fingerprinting; keystroke timing attack

Funding

  1. US National Science Foundation [CNS-1619450]

Ask authors/readers for more resources

GPUs are commonly used to enhance graphical workloads and accelerate data-intensive workloads in data centers and clouds. However, there is a security vulnerability where spy applications can monitor side channels to infer the behavior of victims. The paper demonstrates three end-to-end attacks, including fingerprinting websites, tracking user activities, inferring keystroke timings, and deriving internal parameters of neural network models used by other applications.
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads. Under a number of scenarios the GPU can be shared between multiple applications at a fine granularity allowing a spy application to monitor side channels and attempt to infer the behavior of the victim. For example, OpenGL and WebGL send workloads to the GPU at the granularity of a frame, allowing an attacker to interleave the use of the GPU to measure the side-effects of the victim computation through performance counters or other resource tracking APIs. We demonstrate the vulnerability by implementing three end-to-end attacks. We show that an OpenGL or CUDA based spy can fingerprint websites accurately (attack I), track user activities within the website, and even infer the keystroke timings for a password text box (attack II) with high accuracy. The third attack demonstrates how a CUDA spy application can derive the internal parameters of a neural network model being used by another CUDA application on the cloud. To counter these attacks, the paper suggests mitigations based on limiting the rate of the calls, or limiting the granularity of the returned information.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available