GPU Obfuscation: Attack and Defense Strategies

被引:9
|
作者
Chakraborty, Abhishek [1 ]
Xie, Yang [1 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
关键词
D O I
10.1145/3195970.3196058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Conventional attacks against existing logic obfuscation techniques rely on the presence of an activated hardware for analysis. In reality, obtaining such activated chips may not always be practical, especially if the on-chip test structures are disabled. In this paper, we develop an iterative SAT formulation based attack strategy for deobfuscating many-core GPU hardware without any requirement of an activated chip. Our experiments on a real testbed using NVIDIA's SASSIFI framework reveal that more than 95% of the application runs on such an approximately unlocked GPU result in correct outcomes with 95% confidence-level and 5% confidence-interval. To counter the proposed attack, we develop a Cache Locking countermeasure which significantly degrades the performance of GPGPU applications for a wrong cache-key.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] ATTACK AND DEFENSE
    WHITTAKER, JK
    SOCIAL WORK, 1969, 14 (01) : 3 - 3
  • [32] Role of Analytical Chemistry in Defense Strategies Against Chemical and Biological Attack
    Janata, Jiri
    ANNUAL REVIEW OF ANALYTICAL CHEMISTRY, 2009, 2 : 321 - 331
  • [33] Strategy moves: 14 complete attack and defense strategies for competitive advantage
    Hutzschenreuter, Thomas
    MANAGEMENT INTERNATIONAL REVIEW, 2008, 48 (02) : 255 - 258
  • [34] Supervisor Obfuscation Against Actuator Enablement Attack
    Zhu, Yuting
    Lin, Liyong
    Su, Rong
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 1760 - 1765
  • [36] Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    Almashan, Meshal
    IEEE ACCESS, 2020, 8 : 168994 - 169009
  • [37] DEFENSE OR ATTACK
    BURFOOT, RM
    ELECTRONICS WORLD & WIRELESS WORLD, 1995, (1709): : 323 - 325
  • [38] ATTACK ON DEFENSE
    不详
    ECONOMIST, 1956, 178 (10): : 576 - 576
  • [39] Defense Strategies of Rice in Response to the Attack of the Herbivorous Insect, Chilo suppressalis
    Xiang, Xing
    Liu, Shuhua
    Li, Hongjian
    Danso Ofori, Andrews
    Yi, Xiaoqun
    Zheng, Aiping
    INTERNATIONAL JOURNAL OF MOLECULAR SCIENCES, 2023, 24 (18)
  • [40] Optimal k Cut-Sets in Attack/Defense Strategies on Networks
    Mrad, Mehdi
    Suryahatmaja, Umar S.
    Ben Yaghlane, Asma
    Azaiez, M. Naceur
    IEEE ACCESS, 2020, 8 : 131165 - 131177