Exploiting Bank Conflict-based Side-channel Timing Leakage of GPUs

被引:12
|
作者
Jiang, Zhen Hang [1 ]
Fei, Yunsi [2 ]
Kaeli, David [2 ]
机构
[1] Facebook, Seattle, WA 98109 USA
[2] Northeastern Univ, Elect & Comp Engn Dept, Boston, MA 02115 USA
基金
美国国家科学基金会;
关键词
Side-channel security; GPU security; microarchitectural attack;
D O I
10.1145/3361870
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent information leakage during program execution, modern software cryptographic implementations target constant-time function, where the number of instructions executed remains the same when program inputs change. However, the underlying microarchitecture behaves differently when processing different data inputs, impacting the execution time of the same instructions. These differences in execution time can covertly leak confidential information through a timing channel. Given the recent reports of covert channels present on commercial microprocessors, a number of microarchitectural features on CPUs have been re-examined from a timing leakage perspective. Unfortunately, a similar microarchitectural evaluation of the potential attack surfaces on GPUs has not been adequately performed. Several prior work has considered a timing channel based on the behavior of a GPU's coalescing unit. In this article, we identify a second finer-grained microarchitectural timing channel, related to the banking structure of the CPU's Shared Memory. By considering the timing channel caused by Shared Memory bank conflicts, we have developed a differential timing attack that can compromise table-based cryptographic algorithms. We implement our timing attack on an Nvidia Kepler K40 GPU and successfully recover the complete 128-bit encryption key of an Advanced Encryption Standard (AES) GPU implementation using 900,000 timing samples. We also evaluate the scalability of our attack method by attacking an implementation of the AES encryption algorithm that fully occupies the compute resources of the GPU. We extend our timing analysis onto other Nvidia architectures: Maxwell, Pascal, Volta, and Turing GPUs. We also discuss countermeasures and experiment with a novel multi-key implementation, evaluating its resistance to our side-channel timing attack and its associated performance overhead.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] A Novel Side-Channel Timing Attack on GPUs
    Jiang, Zhen Hang
    Fei, Yunsi
    Kaeli, David
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 167 - 172
  • [2] Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks
    Xiao, Chong
    Tang, Ming
    Guilley, Sylvain
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [3] Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks
    Song, Wei
    Xue, Zihan
    Han, Jinchi
    Li, Zhenzhen
    Liu, Peng
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (04) : 1019 - 1033
  • [4] One more set: Mitigating conflict-based cache side-channel attacks by extending cache set
    Gu, Yuzhe
    Tang, Ming
    Wang, Quancheng
    Wang, Han
    Ding, Haili
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
  • [5] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151
  • [6] ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage
    Rothstein-Morris, Eric
    Sun, Jun
    Chattopadhyay, Sudipta
    2022 20TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2022,
  • [7] An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage
    Yan, Yan
    Oswald, Elisabeth
    Vivek, Srinivas
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 89 - 97
  • [8] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21
  • [9] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [10] Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors
    Zhan, Zihao
    Zhang, Zhenkai
    Liang, Sisheng
    Yao, Fan
    Koutsoukos, Xenofon
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1440 - 1457