GhostLeg: Selective Memory Coalescing for Secure GPU Architecture
نویسندگان
چکیده
Architectural considerations for secure executions are getting more critical GPU since popular security applications and libraries have been ported to a domain rely on GPU’s massively parallel computations. Recent studies disclosed the attack models that exploit architectural vulnerabilities leak secret keys of AES. The high correlations between execution time kernel number memory requests generated from coalescing. Thus prior defenses provide by randomizing or restricting coalescing load warps. However, those defense approaches result in significant performance overhead is an essential feature improving GPU. In this paper, we propose GhostLeg, efficient approach against correlation-based attacks. GhostLeg selectively applies warps minimize induced concealing behavior. Our analysis AES reveals only whose index addresses influenced vulnerable order executions, pinpoints require based class source register. flag assigned each register can be set propagation non-deterministic user data (GhostLeg-ND) specific directive marked programmers (GhostLeg-Key). evaluation shows guarantees attacks GhostLeg-ND exhibits 54.7% higher compared state-of-the-art solution.
منابع مشابه
Optimizing power efficiency for 3D stacked GPU-in-memory architecture
With the prevalence of data-centric computing, the key to achieving energy efficiency is to reduce the latency and energy cost of data movement. Near data processing (NDP) is a such technique which, instead of moving data around, moves computing closer to where data is stored. The emerging 3D stacked memory brings such opportunities for achieving both high power-efficiency as well as less data ...
متن کاملA 3D-Stacked Architecture for Secure Memory Acquisition
Many security and forensic analyses rely on the ability to fetch memory snapshots from a target machine. To date, the security community has relied on virtualization, external hardware or trusted hardware to obtain such snapshots. We show that these prior techniques either sacrifice snapshot consistency or impose a performance penalty on applications executing atop the target. We present a new ...
متن کاملDesign Space Exploration for GPU-Based Architecture
Recent advances in Graphics Processing Units (GPUs) provide opportunities to exploit GPUs for non-graphics applications. Scientific computation is inherently parallel, which is a good candidate to utilize the computing power of GPUs. This report investigates QR factorization, which is an important building block of scientific computation. We analyze different mapping mtheods of QR factorization...
متن کاملThe Demand for a Sound Baseline in GPU Memory Architecture Research
Modern GPUs adopt massive multithreading and multi-level cache hierarchies to hide long operation latencies, especially off-chip memory access latencies. However, poor cache indexing and cache line allocation policy as well as a small number of miss-status handling registers (MSHRs) can exacerbate the problem of cache thrashing and cache-missrelated resource congestion. Besides, modulo address ...
متن کاملAspect-Oriented Secure Connectors for Implementation of Secure Software Architecture
This paper describes aspect-oriented secure connectors for implementing secure software architecture for distributed business applications. A secure connector for secure software architecture can be designed separately from application business components by considering different communication patterns between the components as well as security services required by application components. In th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3216325