GPU Obfuscation: Attack and Defense Strategies

被引:9
|
作者
Chakraborty, Abhishek [1 ]
Xie, Yang [1 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
关键词
D O I
10.1145/3195970.3196058
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Conventional attacks against existing logic obfuscation techniques rely on the presence of an activated hardware for analysis. In reality, obtaining such activated chips may not always be practical, especially if the on-chip test structures are disabled. In this paper, we develop an iterative SAT formulation based attack strategy for deobfuscating many-core GPU hardware without any requirement of an activated chip. Our experiments on a real testbed using NVIDIA's SASSIFI framework reveal that more than 95% of the application runs on such an approximately unlocked GPU result in correct outcomes with 95% confidence-level and 5% confidence-interval. To counter the proposed attack, we develop a Cache Locking countermeasure which significantly degrades the performance of GPGPU applications for a wrong cache-key.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] The Vulnerability of the Military SoS Networks under Different Attack and Defense Strategies
    Jin, Wei-Xin
    Song, Ping
    Liu, Guo-Zhu
    2014 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2014, : 65 - 72
  • [42] Attack and defense
    Jonsson, Eirikur
    LAEKNABLADID, 2022, 108 (09): : 385 - 385
  • [43] Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    2019 IEEE 14TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEM (ISADS), 2019, : 37 - 42
  • [44] Optimal jamming attack strategies and network defense policies in wireless sensor networks
    Boeing Research and Technology, Boeing Company, MC 7L-69, PO Box 3707, Seattle, WA 98124-2207, United States
    不详
    不详
    不详
    IEEE Trans. Mob. Comput., 8 (1119-1133):
  • [45] Demonstrated LLC-Layer Attack and Defense Strategies for Wireless Communication Systems
    Hitefield, S.
    Nguyen, V.
    Carlson, C.
    O'Shea, T.
    Clancy, T.
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 60 - 66
  • [46] Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning
    Sultana, Rukhsar
    Grover, Jyoti
    Tripathi, Meenakshi
    PERVASIVE AND MOBILE COMPUTING, 2024, 103
  • [47] Robustness of the Chinese power grid to cascading failures under attack and defense strategies
    Li, Kaiwen
    Liu, Kai
    Wang, Ming
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 33
  • [48] Stability and topology of scale-free networks under attack and defense strategies
    Gallos, LK
    Cohen, R
    Argyrakis, P
    Bunde, A
    Havlin, S
    PHYSICAL REVIEW LETTERS, 2005, 94 (18)
  • [49] Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
    Li, Mingyan
    Koutsopoulos, Iordanis
    Poovendran, Radha
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (08) : 1119 - 1133
  • [50] Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies
    Shi, Yi
    Sagduyu, Yalin E.
    Erpek, Tugba
    Davaslioglu, Kemal
    Lu, Zhuo
    Li, Jason H.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2018,