Proceedings of the ACM International Conference on Supercomputing 2019
DOI: 10.1145/3330345.3330389
|View full text |Cite
|
Sign up to set email alerts
|

GPUGuard

Abstract: Graphics processing units (GPUs) are moving towards supporting concurrent kernel execution where multiple kernels may be co-executed on the same GPU and even on the same streaming multiprocessor (SM) core. While concurrent kernel execution improves hardware resource utilization, it opens up vulnerabilities to covert-channel and side-channel attacks. These attacks exploit information leakage across kernels that results from contention on shared resources; they have been shown to be a dangerous threat on CPUs, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(1 citation statement)
references
References 63 publications
0
0
0
Order By: Relevance
“…The covert channel-using table to transmit secure data that allows two entities to agree on a secret key using encryption to prevent an attacker from getting any information. Qiumin Xu et al [20] a Trojan application can cause resource contention by altering the contents of a cache set to encode '1' and leaving the resource idle to encode '0'. On the other hand, the Spy application visits the cache and measures its access time in order to decode the transferred bit.…”
Section: Covert Channel Senariosmentioning
confidence: 99%
“…The covert channel-using table to transmit secure data that allows two entities to agree on a secret key using encryption to prevent an attacker from getting any information. Qiumin Xu et al [20] a Trojan application can cause resource contention by altering the contents of a cache set to encode '1' and leaving the resource idle to encode '0'. On the other hand, the Spy application visits the cache and measures its access time in order to decode the transferred bit.…”
Section: Covert Channel Senariosmentioning
confidence: 99%