2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA) 2021
DOI: 10.1109/hpca51647.2021.00036
|View full text |Cite
|
Sign up to set email alerts
|

Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…As on CPUs, the GPU cache is a particularly interesting resource for side channels. Consequently, prior work also replicated well-known CPU cache side-channel attacks on GPUs [6,10,12,15,16], albeit only in native code so far.…”
Section: Introductionmentioning
confidence: 83%
See 2 more Smart Citations
“…As on CPUs, the GPU cache is a particularly interesting resource for side channels. Consequently, prior work also replicated well-known CPU cache side-channel attacks on GPUs [6,10,12,15,16], albeit only in native code so far.…”
Section: Introductionmentioning
confidence: 83%
“…Jiang et al [7][8][9] present a cache-based attack, a shared memory attack, and a bank-conflict attack, all leading to a key recovery attack on AES. Similarly, Ahn et al [6] exploit cache conflicts to recover an AES key from a GPU implementation. While they rely on cycle-accurate timers, our attack works from the browser without a timer.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Ahn et al revealed the characteristics of local caches in the modern GPU architectures are different from the original cache design. They disclosed a new correlation-based attack that uses negative correlations and cache collisions [35]. Luo et al presented that encryption keys of RSA ported to a GPU domain can be extracted by measuring the execution latencies of several window units of RSA [36].…”
Section: Related Work a Security Attacks On Gpumentioning
confidence: 99%
“…Lin et al presented a software-based modification that changes the compositions of T-tables make AES generates a fixed number of memory requests [41]. Ahn et al proposed a defense mechanism, called Trident, which makes memory transactions bypass the L1 cache randomly [35]. Even though these defense solutions can be effective to protect secret data from the correlation-based attacks, such approaches cause significant performance drops.…”
Section: B Defenses Against Gpu Security Attacksmentioning
confidence: 99%