On the effectiveness of using graphics interrupt as a side channel for user behavior snooping

Graphics Processing Units (GPUs) are now a key component of many devices and systems, including those in the cloud and data centers, thus are also subject to side-channel attacks. Existing side-channel attacks on GPUs typically leak information from graphics libraries like OpenGL and CUDA, which req...

Full description

Saved in:
Bibliographic Details
Main Authors: MA, Haoyu, TIAN, Jianwen, GAO, Debin, JIA, Chunfu
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2022
Subjects:
GPU
Online Access:https://ink.library.smu.edu.sg/sis_research/6749
https://ink.library.smu.edu.sg/context/sis_research/article/7752/viewcontent/tdsc_2021_2.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-7752
record_format dspace
spelling sg-smu-ink.sis_research-77522024-03-20T02:27:53Z On the effectiveness of using graphics interrupt as a side channel for user behavior snooping MA, Haoyu TIAN, Jianwen GAO, Debin JIA, Chunfu Graphics Processing Units (GPUs) are now a key component of many devices and systems, including those in the cloud and data centers, thus are also subject to side-channel attacks. Existing side-channel attacks on GPUs typically leak information from graphics libraries like OpenGL and CUDA, which require creating contentions within the GPU resource space and are being mitigated with software patches. This paper evaluates potential side channels exposed at a lower-level interface between GPUs and CPUs, namely the graphics interrupts. These signals could indicate unique signatures of GPU workload, allowing a spy process to infer the behavior of other processes. We demonstrate the practicality and generality of such side-channel exploitation with a variety of assumed attack scenarios. Simulations on both Nvidia and Intel graphics adapters showed that our attack could achieve high accuracy, while in-depth studies were also presented to explore the low-level rationale behind such effectiveness. On top of that, we further propose a practical mitigation scheme which protects GPU workloads against the graphics-interrupt-based side-channel attack by piggybacking mask payloads on them to generate interfering graphics interrupt “noises”. Experiments show that our mitigation technique effectively prohibited spy processes from inferring user behaviors via analyzing runtime patterns of graphics interrupt with only trivial overhead. 2022-09-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/6749 info:doi/10.1109/TDSC.2021.3091159 https://ink.library.smu.edu.sg/context/sis_research/article/7752/viewcontent/tdsc_2021_2.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Side-channel attacks GPU graphics interrupts machine learning Graphics and Human Computer Interfaces
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Side-channel attacks
GPU
graphics interrupts
machine learning
Graphics and Human Computer Interfaces
spellingShingle Side-channel attacks
GPU
graphics interrupts
machine learning
Graphics and Human Computer Interfaces
MA, Haoyu
TIAN, Jianwen
GAO, Debin
JIA, Chunfu
On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
description Graphics Processing Units (GPUs) are now a key component of many devices and systems, including those in the cloud and data centers, thus are also subject to side-channel attacks. Existing side-channel attacks on GPUs typically leak information from graphics libraries like OpenGL and CUDA, which require creating contentions within the GPU resource space and are being mitigated with software patches. This paper evaluates potential side channels exposed at a lower-level interface between GPUs and CPUs, namely the graphics interrupts. These signals could indicate unique signatures of GPU workload, allowing a spy process to infer the behavior of other processes. We demonstrate the practicality and generality of such side-channel exploitation with a variety of assumed attack scenarios. Simulations on both Nvidia and Intel graphics adapters showed that our attack could achieve high accuracy, while in-depth studies were also presented to explore the low-level rationale behind such effectiveness. On top of that, we further propose a practical mitigation scheme which protects GPU workloads against the graphics-interrupt-based side-channel attack by piggybacking mask payloads on them to generate interfering graphics interrupt “noises”. Experiments show that our mitigation technique effectively prohibited spy processes from inferring user behaviors via analyzing runtime patterns of graphics interrupt with only trivial overhead.
format text
author MA, Haoyu
TIAN, Jianwen
GAO, Debin
JIA, Chunfu
author_facet MA, Haoyu
TIAN, Jianwen
GAO, Debin
JIA, Chunfu
author_sort MA, Haoyu
title On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
title_short On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
title_full On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
title_fullStr On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
title_full_unstemmed On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
title_sort on the effectiveness of using graphics interrupt as a side channel for user behavior snooping
publisher Institutional Knowledge at Singapore Management University
publishDate 2022
url https://ink.library.smu.edu.sg/sis_research/6749
https://ink.library.smu.edu.sg/context/sis_research/article/7752/viewcontent/tdsc_2021_2.pdf
_version_ 1794549873594335232