GPU Taint Tracking
نویسندگان
چکیده
Dynamic tainting tracks the influence of certain inputs (taint sources) through execution and it is a powerful tool for information flow analysis and security. Taint tracking has primarily targeted CPU program executions. Motivated by recent recognition of information leaking in GPU memory and GPU-resident malware, this paper presents the first design and prototype implementation of a taint tracking system on GPUs. Our design combines a static binary instrumentation with dynamic tainting at runtime. We present new performance optimizations by exploiting unique GPU characteristics—a large portion of instructions on GPU runtime parameters and constant memory can be safely eliminated from taint tracking; large GPU register file allows fast maintenance of a hot portion of the taint map. Experiments show that these techniques improved the GPU taint tracking performance by 5 to 20 times for a range of image processing, data encryption, and deep learning applications. We further demonstrate that GPU taint tracking can enable zeroing sensitive data to minimize information leaking as well as identifying and countering GPU-resident malware.
منابع مشابه
LazyTainter : Memory - Efficient Taint Tracking in Managed Runtimes
LazyTainter : Memory-Efficient Taint Tracking in Managed Runtimes Zheng Wei Master of Science Graduate Department of Computer Science University of Toronto 2014 The leakage of private information is of great concern on mobile devices since they contain a great deal of sensitive information. This has spurred interest in the use of taint tracking systems to track and monitor the flow of private i...
متن کاملTaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly
WebAssembly (wasm) has recently emerged as a promisingly portable, size-efficient, fast, and safe binary format for the web. As WebAssembly can interact freely with JavaScript libraries, this gives rise to a potential for undesirable behavior to occur. It is therefore important to be able to detect when this might happen. A way to do this is through taint tracking, where we follow the flow of i...
متن کاملTaint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking
Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, including detecting unknown exploits, analyzing malware, preventing information leaks, and many more. Recently, it has been also utilized to track data across processes and hosts to shed light on the interaction of distributed components, but also for security purposes. This paper presents Taint-Exchan...
متن کاملDROIT+: Taint Tracking for Storage Access on Android
The leakage of sensitive data has been a major concern in Android ecosystem. Analysts therefore propose dynamical taint tracking to effectively track the data flow of accessed data. However, the off-the-shelf taint tracking systems lack byte-granularity support for storage tracking. In this paper, we propose DROIT+ which uses the fine-grained storage tracking technique to track data flow among ...
متن کاملTaintSNIFFER: A Robust Dynamic Taint Tracking System For a Homogenous Web Browsing Environment
In this paper we have implemented a fairly robust tainttracking facility in the JavaScript language implementationof the Microsoft Research’s C3 system. We have also imple-mented a comprehensive suite of test cases (in JavaScript)along with a framework (in C#) ensuring that our sematicshave been correctly implemented. Using our taint trackingsystem, we have illustrat...
متن کامل