Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors

2022 IEEE Symposium on Security and Privacy (SP)(2022)

引用 12|浏览1
暂无评分
摘要
As the popularity of graphics processing units (GPUs) grows rapidly in recent years, it becomes very critical to study and understand the security implications imposed by them. In this paper, we show that modern GPUs can “broadcast” sensitive information over the air to make a number of attacks practical. Specifically, we present a new electromagnetic (EM) side-channel vulnerability that we have discovered in many GPUs of both NVIDIA and AMD. We show that this vulnerability can be exploited to mount realistic attacks through two case studies, which are website fingerprinting and keystroke timing inference attacks. Our investigation recognizes the commonly used dynamic voltage and frequency scaling (DVFS) feature in GPU as the root cause of this vulnerability. Nevertheless, we also show that simply disabling DVFS may not be an effective countermeasure since it will introduce another highly exploitable EM side-channel vulnerability. To the best of our knowledge, this is the first work that studies realistic physical side-channel attacks on non-shared GPUs at a distance.
更多
查看译文
关键词
graphics peeping unit,EM side-channel information,security implications,sensitive information,electromagnetic side-channel vulnerability,inference attacks,dynamic voltage and frequency scaling,frequency scaling,DVFS,realistic physical side-channel attacks,nonshared GPU,EM side-channel vulnerability,NVIDIA,AMD,website fingerprinting,keystroke timing inference attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要