University Researchers Publish Paper On GPU Side-Channel Attacks

Written by Michael Larabel in Linux Security on 15 November 2018 at 08:58 AM EST. 13 Comments
LINUX SECURITY
University researchers out of University of California Riverside have published a paper this week detailing vulnerabilities in current GPU architectures making them vulnerable to side-channel attacks akin to Spectre and Meltdown.

With their focus on NVIDIA GPUs, UCLA Riverside researchers demonstrated attacks both for graphics and compute by exploiting the GPU's performance counters. Demonstrated attacks included a browser-based attack, extracting passwords / keystroke logging, and even the possibility of exposing a CUDA neural network algorithm.

Proposed mitigations include limiting the granularity of exposed counters or rate limiting those calls.

While demonstrated on NVIDIA GPUs, it's quite possible AMD Radeon hardware is also vulnerable. These attacks would be vulnerable under Linux as well and all major Linux GPU drivers do expose their perf counters to user-space.


More details on the GPU side-channel attack research via the paper.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week