2020 57th ACM/IEEE Design Automation Conference (DAC) 2020
DOI: 10.1109/dac18072.2020.9218690
|View full text |Cite
|
Sign up to set email alerts
|

A Novel GPU Overdrive Fault Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…The number and distribution of faults depends on whether the voltage has fast (glitches) or steady changes [97]. Low-power applications pushed for the emergence of dynamic voltage and frequency scaling (DVFS) techniques, which, as it turns out, can be abused for remote fault-injection attacks against CPUs and GPUs [173,185,206].…”
Section: Fault Injectionmentioning
confidence: 99%
“…The number and distribution of faults depends on whether the voltage has fast (glitches) or steady changes [97]. Low-power applications pushed for the emergence of dynamic voltage and frequency scaling (DVFS) techniques, which, as it turns out, can be abused for remote fault-injection attacks against CPUs and GPUs [173,185,206].…”
Section: Fault Injectionmentioning
confidence: 99%
“…This privilege to control the hardware regulators at a very fine granularity offers an opportunity to inject faults into the target circuit. It has been demonstrated that the control privilege of DVFS can be escalated by malicious kernel driver to inject oblivious faults into ARM SoC [38] [39], x86 processor [40] [41] [42] and GPU [43]. Given that DVFS is the predominant and widely used technique for hardware acceleration of DNN computations, timing errors can also be introduced into the clock signal of the PE array by sending malicious commands through the host processor without the physical access to the endpoint device.…”
Section: Proposed Glitch Injection Attack a Attack Modelmentioning
confidence: 99%
“…This privilege to control the hardware regulators at a very fine granularity offers an opportunity to inject faults into the target circuit. It has been demonstrated that the control privilege of DVFS can be escalated by malicious kernel driver to inject oblivious faults into ARM SoC [71], [100], x86 processor [101][102] [103] and GPU [104]. Given that DVFS is the predominant and widely used technique for hardware acceleration of DNN computations, timing errors can also be introduced into the clock signal of the PE array by sending malicious commands through the host processor without the physical access to the endpoint device.…”
Section: Attack Modelmentioning
confidence: 99%