GhostLeg: Selective Memory Coalescing for Secure GPU Architecture

نویسندگان

چکیده

Architectural considerations for secure executions are getting more critical GPU since popular security applications and libraries have been ported to a domain rely on GPU’s massively parallel computations. Recent studies disclosed the attack models that exploit architectural vulnerabilities leak secret keys of AES. The high correlations between execution time kernel number memory requests generated from coalescing. Thus prior defenses provide by randomizing or restricting coalescing load warps. However, those defense approaches result in significant performance overhead is an essential feature improving GPU. In this paper, we propose GhostLeg, efficient approach against correlation-based attacks. GhostLeg selectively applies warps minimize induced concealing behavior. Our analysis AES reveals only whose index addresses influenced vulnerable order executions, pinpoints require based class source register. flag assigned each register can be set propagation non-deterministic user data (GhostLeg-ND) specific directive marked programmers (GhostLeg-Key). evaluation shows guarantees attacks GhostLeg-ND exhibits 54.7% higher compared state-of-the-art solution.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing power efficiency for 3D stacked GPU-in-memory architecture

With the prevalence of data-centric computing, the key to achieving energy efficiency is to reduce the latency and energy cost of data movement. Near data processing (NDP) is a such technique which, instead of moving data around, moves computing closer to where data is stored. The emerging 3D stacked memory brings such opportunities for achieving both high power-efficiency as well as less data ...

متن کامل

A 3D-Stacked Architecture for Secure Memory Acquisition

Many security and forensic analyses rely on the ability to fetch memory snapshots from a target machine. To date, the security community has relied on virtualization, external hardware or trusted hardware to obtain such snapshots. We show that these prior techniques either sacrifice snapshot consistency or impose a performance penalty on applications executing atop the target. We present a new ...

متن کامل

Design Space Exploration for GPU-Based Architecture

Recent advances in Graphics Processing Units (GPUs) provide opportunities to exploit GPUs for non-graphics applications. Scientific computation is inherently parallel, which is a good candidate to utilize the computing power of GPUs. This report investigates QR factorization, which is an important building block of scientific computation. We analyze different mapping mtheods of QR factorization...

متن کامل

The Demand for a Sound Baseline in GPU Memory Architecture Research

Modern GPUs adopt massive multithreading and multi-level cache hierarchies to hide long operation latencies, especially off-chip memory access latencies. However, poor cache indexing and cache line allocation policy as well as a small number of miss-status handling registers (MSHRs) can exacerbate the problem of cache thrashing and cache-missrelated resource congestion. Besides, modulo address ...

متن کامل

Aspect-Oriented Secure Connectors for Implementation of Secure Software Architecture

This paper describes aspect-oriented secure connectors for implementing secure software architecture for distributed business applications. A secure connector for secure software architecture can be designed separately from application business components by considering different communication patterns between the components as well as security services required by application components. In th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3216325