2019
DOI: 10.1145/3361870
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Bank Conflict-based Side-channel Timing Leakage of GPUs

Abstract: To prevent information leakage during program execution, modern software cryptographic implementations target constant-time function, where the number of instructions executed remains the same when program inputs change. However, the underlying microarchitecture behaves differently when processing different data inputs, impacting the execution time of the same instructions. These differences in execution time can covertly leak confidential information through a timing channel. Given the recent reports of cover… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
references
References 38 publications
0
0
0
Order By: Relevance