4.6 Article

Side Channel Attacks on GPUs

期刊

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2019.2944624

关键词

Graphics processing units; Graphics; Kernel; Instruction sets; Timing; Engines; Computer architecture; GPU; side channels; website fingerprinting; keystroke timing attack

资金

  1. US National Science Foundation [CNS-1619450]

向作者/读者索取更多资源

GPUs are commonly used to enhance graphical workloads and accelerate data-intensive workloads in data centers and clouds. However, there is a security vulnerability where spy applications can monitor side channels to infer the behavior of victims. The paper demonstrates three end-to-end attacks, including fingerprinting websites, tracking user activities, inferring keystroke timings, and deriving internal parameters of neural network models used by other applications.
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads. Under a number of scenarios the GPU can be shared between multiple applications at a fine granularity allowing a spy application to monitor side channels and attempt to infer the behavior of the victim. For example, OpenGL and WebGL send workloads to the GPU at the granularity of a frame, allowing an attacker to interleave the use of the GPU to measure the side-effects of the victim computation through performance counters or other resource tracking APIs. We demonstrate the vulnerability by implementing three end-to-end attacks. We show that an OpenGL or CUDA based spy can fingerprint websites accurately (attack I), track user activities within the website, and even infer the keystroke timings for a password text box (attack II) with high accuracy. The third attack demonstrates how a CUDA spy application can derive the internal parameters of a neural network model being used by another CUDA application on the cloud. To counter these attacks, the paper suggests mitigations based on limiting the rate of the calls, or limiting the granularity of the returned information.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据