University Researchers Publish Paper On GPU Side-Channel Attacks
Written by Michael Larabel in Security on 15 November 2018 at 08:58 AM EST. 13 Comments
SECURITY --
University researchers out of University of California Riverside have published a paper this week detailing vulnerabilities in current GPU architectures making them vulnerable to side-channel attacks akin to Spectre and Meltdown.

With their focus on NVIDIA GPUs, UCLA Riverside researchers demonstrated attacks both for graphics and compute by exploiting the GPU's performance counters. Demonstrated attacks included a browser-based attack, extracting passwords / keystroke logging, and even the possibility of exposing a CUDA neural network algorithm.

Proposed mitigations include limiting the granularity of exposed counters or rate limiting those calls.

While demonstrated on NVIDIA GPUs, it's quite possible AMD Radeon hardware is also vulnerable. These attacks would be vulnerable under Linux as well and all major Linux GPU drivers do expose their perf counters to user-space.


More details on the GPU side-channel attack research via the paper.
About The Author
Author picture

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter or contacted via MichaelLarabel.com.

Related Security News
Popular News This Week