2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) 2015
DOI: 10.1109/inm.2015.7140493
|View full text |Cite
|
Sign up to set email alerts
|

Data remanence and digital forensic investigation for CUDA Graphics Processing Units

Abstract: This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (GPUs). With recent advances in the performance and viability of using GPUs for various highly-parallelised data processing tasks, a number of security challenges are raised. Unscrupulous software running subsequently on the same GPU, either by the same user, or another user, in a multiuser system, may be able to gain access to the contents of the GPU memory. This contains data from previous program executions. I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Data Remanence Attacks: Data remanence in the context of storage devices has been studied extensively in the literature. We refer the reader to the vast body of literature on that topic [19], [20], [4], [5]. Networks are also vulnerable to memory data remanence attacks as memory is a main component of switches.…”
Section: Related Workmentioning
confidence: 99%
“…Data Remanence Attacks: Data remanence in the context of storage devices has been studied extensively in the literature. We refer the reader to the vast body of literature on that topic [19], [20], [4], [5]. Networks are also vulnerable to memory data remanence attacks as memory is a main component of switches.…”
Section: Related Workmentioning
confidence: 99%
“…Bellekens et al [36] discuss ways in which remanent sensitive data may be leaked from the global, shared and texture memory of a GPU. For GlM, a benign user transfers data from the host to the GPU using cudaMalloc and cudaMemcpy.…”
Section: Leakage Through Processor Componentsmentioning
confidence: 99%
“…Having the ability to investigate the operation of CUDAbased software is of great importance, specifically given the well-documented use of GPUs for the unauthorised processing of potentially confidential data [1], as well as for use in compression and cryptography [15]. With sensitive data routinely being exposed to GPUs, the ability for forensic investigators to respond to security incidents involving the potential compromise of these systems and rapidly investigate the precise nature of the suspect code involved, is critical to presenting an effective incident response.…”
Section: Reverse Engineering and Rela-tion To Cudamentioning
confidence: 99%
“…Being able to identify the operations carried out may allow an investigator to establish the potential exposure of confidential information, or to identify what operations were carried out on data previously held on the GPU [1]. Analysis may be necessary for the purpose of creating intrusion detection system signatures [2] or the detection and classification of similar threats in future.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation