GPU Obfuscation: Attack and Defense Strategies

被引:9
|
作者
Chakraborty, Abhishek [1 ]
Xie, Yang [1 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
关键词
D O I
10.1145/3195970.3196058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Conventional attacks against existing logic obfuscation techniques rely on the presence of an activated hardware for analysis. In reality, obtaining such activated chips may not always be practical, especially if the on-chip test structures are disabled. In this paper, we develop an iterative SAT formulation based attack strategy for deobfuscating many-core GPU hardware without any requirement of an activated chip. Our experiments on a real testbed using NVIDIA's SASSIFI framework reveal that more than 95% of the application runs on such an approximately unlocked GPU result in correct outcomes with 95% confidence-level and 5% confidence-interval. To counter the proposed attack, we develop a Cache Locking countermeasure which significantly degrades the performance of GPGPU applications for a wrong cache-key.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] On Securing Scan Obfuscation Strategies Against ScanSAT Attack
    Karmakar, Rajit
    Chattopadhyay, Santanu
    PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 213 - 218
  • [2] Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU
    Karimi, Elmira
    Fei, Yunsi
    Kaeli, David
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 122 - 131
  • [3] Attack Graph Obfuscation
    Polad, Hadar
    Puzis, Rami
    Shapira, Bracha
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 269 - 287
  • [4] Jamming sensor networks: Attack and defense strategies
    Xu, Wenyuan
    Ma, Ke
    Trappe, Wade
    Zhang, Yanyong
    IEEE NETWORK, 2006, 20 (03): : 41 - 47
  • [5] AN ATTACK-DEFENSE GAME WITH MATRIX STRATEGIES
    COHEN, ND
    NAVAL RESEARCH LOGISTICS QUARTERLY, 1966, 13 (04): : 391 - &
  • [6] Analysis of ARP Spoofing Attack and Defense Strategies
    Xu, Shuxin
    Zhang, Weigang
    ASIA-PACIFIC MANAGEMENT AND ENGINEERING CONFERENCE (APME 2014), 2014, : 193 - 198
  • [7] Analysis of Attack and Defense Strategies on Complex Networks
    Jiang Yu
    Wang Yubo
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 58 - 62
  • [8] A methodological review on attack and defense strategies in cyber warfare
    Ramaswamy Swarnammal Shaji
    V. Sachin Dev
    Thomas Brindha
    Wireless Networks, 2019, 25 : 3323 - 3334
  • [9] Optimal Attack Strategies in a Dynamic Botnet Defense Model
    Shang, Y.
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (01): : 29 - 33
  • [10] A methodological review on attack and defense strategies in cyber warfare
    Shaji, Ramaswamy Swarnammal
    Dev, V. Sachin
    Brindha, Thomas
    WIRELESS NETWORKS, 2019, 25 (06) : 3323 - 3334