GPU Obfuscation: Attack and Defense Strategies

被引:9
|
作者
Chakraborty, Abhishek [1 ]
Xie, Yang [1 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
关键词
D O I
10.1145/3195970.3196058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Conventional attacks against existing logic obfuscation techniques rely on the presence of an activated hardware for analysis. In reality, obtaining such activated chips may not always be practical, especially if the on-chip test structures are disabled. In this paper, we develop an iterative SAT formulation based attack strategy for deobfuscating many-core GPU hardware without any requirement of an activated chip. Our experiments on a real testbed using NVIDIA's SASSIFI framework reveal that more than 95% of the application runs on such an approximately unlocked GPU result in correct outcomes with 95% confidence-level and 5% confidence-interval. To counter the proposed attack, we develop a Cache Locking countermeasure which significantly degrades the performance of GPGPU applications for a wrong cache-key.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Game Theoretic Approach to Model Cyber Attack and Defense Strategies
    Attiah, Afraa
    Chatterjee, Mainak
    Zou, Cliff C.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [22] Adversarial attack and defense strategies for deep speaker recognition systems
    Jati, Arindam
    Hsu, Chin-Cheng
    Pal, Monisankha
    Peri, Raghuveer
    AbdAlmageed, Wael
    Narayanan, Shrikanth
    COMPUTER SPEECH AND LANGUAGE, 2021, 68
  • [23] Survey of Security Attack and Defense Strategies for Artificial Intelligence Model
    Qin, Zhen
    Zhuang, Tianming
    Zhu, Guosong
    Zhou, Erqiang
    Ding, Yi
    Geng, Ji
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2627 - 2648
  • [24] Novel Stealthy Attack and Defense Strategies for Networked Control Systems
    Mao, Yanbing
    Jafarnejadsani, Hamidreza
    Zhao, Pan
    Akyol, Emrah
    Hovakimyan, Naira
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) : 3847 - 3862
  • [25] Application of hybrid strategies of complex network attack and defense games
    Li, Zhe
    Liu, Jin
    Ren, Jiaqi
    Dong, Yibo
    Li, Weili
    CHAOS SOLITONS & FRACTALS, 2024, 189
  • [26] Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey
    Tan, Hao
    Wang, Le
    Zhang, Huan
    Zhang, Junjian
    Shafiq, Muhammad
    Gu, Zhaoquan
    ELECTRONICS, 2022, 11 (14)
  • [27] Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing
    Khan, Hassan
    Hengartner, Urs
    Vogel, Daniel
    PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018), 2018,
  • [28] Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid
    Kang, WenJie
    Zhu, PeiDong
    Liu, XuChong
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1027 - 1032
  • [29] A Combined Logical and Physical Attack on Logic Obfuscation
    Zuzak, Michael
    Liu, Yuntao
    McDaniel, Isaac
    Srivastava, Ankur
    2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2022,
  • [30] Attack-defense differential game to strength allocation strategies generation
    Li, Lingwei
    Xiao, Bing
    Su, Shihong
    Zhang, Haichao
    Wu, Xiwei
    Guo, Yiming
    OPTIMAL CONTROL APPLICATIONS & METHODS, 2023, 44 (06): : 3219 - 3236