2017
DOI: 10.1515/popets-2017-0016
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU

Abstract: According to previous reports, information could be leaked from GPU memory; however, the security implications of such a threat were mostly overlooked, because only limited information could be indirectly extracted through side-channel attacks. In this paper, we propose a novel algorithm for recovering raw data directly from the GPU memory residues of many popular applications such as Google Chrome and Adobe PDF reader. Our algorithm enables harvesting highly sensitive information including credit card numbers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…In CURE, peripherals can either be assigned exclusively to a single enclave, by the SM, at enclave setup or shared between different enclaves and/or the OS. The peripheral's internal memory is flushed by the SM when (re-)assigned to a new entity to prevent information leakage [49,72,107]. Protecting virtual machines.…”
Section: Kernel-space Enclavesmentioning
confidence: 99%
“…In CURE, peripherals can either be assigned exclusively to a single enclave, by the SM, at enclave setup or shared between different enclaves and/or the OS. The peripheral's internal memory is flushed by the SM when (re-)assigned to a new entity to prevent information leakage [49,72,107]. Protecting virtual machines.…”
Section: Kernel-space Enclavesmentioning
confidence: 99%
“…Pix-elVault [64] exploits physical isolation between CPUs and GPUs to implement secure key storage for keys, although it was shown to be insecure [79]. Attacks leveraging GPU memory reuse without re-initialization [17,35,78] are a common theme. Techniques to isolate malicious device drivers [8], protect the system from malicious accelerators [48], or provide trusted I/O paths for accelerators [29,71,77] are applicable to securing GPUs as well.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Similarly, in mission-critical applications where GPUs store and process sensitive data, an attack on them can have huge financial and social consequences. For example, Zhou et al [19] demonstrate extraction of credit card numbers and email contents from remanent data in GPU memory. Also, in companies, a malicious insider may access classified documents which were opened on a shared GPU by an authorized user.…”
Section: Lack Of Documentation and Open-source Toolsmentioning
confidence: 99%
“…Zhou et al [19] discuss an attack on GPU where a nonprivileged adversary can leak sensitive information from the remanent raw data in GPU memory. They first detect data partitions which have a high likelihood of being parts of images.…”
Section: End Of Contextmentioning
confidence: 99%