can leak information as contention arises between applications that
share a resource. Given the wide-spread use of GPUs, we believe
that they are an especially important component to secure.
The paper also considered possible defenses. We proposed a
mitigation based on limiting the rate of access to the APIs that leak
the side channel information. Alternatively (or in combination),
we can reduce the precision of this information. We showed that
such defenses substantially reduce the effectiveness of the attack,
to the point where the attacks are no longer effective. Finding the
right balance between utility and side channel leakage for general
applications is an interesting tradeoff to study for this class of
mitigations.
ACKNOWLEDGEMENT
The authors would like to thank the anonymous reviewers for their
valuable comments and helpful suggestions. The work is supported
by the National Science Foundation under Grant No.:CNS-1619450.
REFERENCES
[1] 2018. Alexa Top Sites. https://www.alexa.com/topsites.
[2]
2018. ARB Extenstion, Khronos Group. https://www.khronos.org/registry/
OpenGL/extensions/ARB/ARB_shader_clock.txt.
[3] 2018. CUDA-enabled GPUs, Nvidia. https://developer.nvidia.com/cuda-gpus.
[4] 2018. CUDA, Nvidia. https://developer.nvidia.com/cuda-zone/.
[5]
2018. GPU Architecture Roadmap, The Chromium Projects.
https://www.chromium.org/developers/design-documents/
gpu-accelerated- compositing-in-chrome/gpu- architecture-roadmap.
[6]
2018. GPU Cloud Computing, Nvidia. https://www.nvidia.com/en-us/
data-center/gpu- cloud-computing/.
[7] 2018. GPUPerfAPI. https://gpuopen.com/gaming- product/gpuperfapi/.
[8]
2018. Linux Graphics Debugger, Nvidia. https://developer.nvidia.com/
linux-graphics- debugger.
[9]
2018. Multi-Process Service, Nvidia. https://docs.nvidia.com/deploy/pdf/CUDA_
Multi_Process_Service_Overview.pdf.
[10]
2018. NVIDIA Profiler User’s Guide. http://docs.nvidia.com/cuda/
profiler-users- guide/index.html.
[11]
2018. NVIDIA’s Next Generation CUDA Compute Architecture:
Kepler GK110. https://www.nvidia.com/content/PDF/kepler/
NVIDIA-Kepler-GK110-Architecture-Whitepaper.pdf.
[12]
2018. OpenCL Extenstion, Khronos Group. https://www.khronos.org/registry/
OpenCL/extensions/amd/cl_amd_device_attribute_query.txt.
[13] 2018. OpenCL Overview, Khronos Group. https://www.khronos.org/opencl/.
[14]
2018. OpenGL Extension, ATI. https://www.khronos.org/registry/OpenGL/
extensions/ATI/ATI_meminfo.txt.
[15]
2018. OpenGL Extenstion, Khronos Group. https://www.khronos.org/registry/
OpenGL/extensions/NVX/NVX_gpu_memory_info.txt.
[16]
2018. OpenGL Extenstion, Khronos Group. https://www.khronos.org/registry/
OpenGL/extensions/NV/NV_shader_thread_group.txt.
[17] 2018. OpenGL Overview, Khronos Group. https://www.khronos.org/opengl/.
[18]
2018. Tegra Graphics Debugger, Nvidia. https://developer.nvidia.com/
tegra-graphics- debugger.
[19] 2018. Vulkan Overview, Khronos Group. https://www.khronos.org/vulkan/.
[20] 2018. WebGL Overview, Khronos Group. https://www.khronos.org/webgl/.
[21]
2018. WebGL Security, Khronos Group. https://www.khronos.org/webgl/
security/.
[22] 2018. WebGL Statistics. http://webglstats.com/.
[23]
Onur Aciiçmez, Billy Bob Brumley, and Philipp Grabher. 2010. New Results on
Instruction Cache Attacks. In Proceedings of the 12th International Conference
on Cryptographic Hardware and Embedded Systems (CHES’10). Springer-Verlag,
Berlin, Heidelberg, 110–124. http://dl.acm.org/citation.cfm?id=1881511.1881522
[24]
Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La
Porta, Patrick McDaniel, and Lisa Marvel. 2017. Malicious co-residency on the
cloud: Attacks and defense. In IEEE Conference on Computer Communications
(INFOCOM’17). 1–9. https://doi.org/10.1109/INFOCOM.2017.8056951
[25]
Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, and Gerardo Pelosi.
2009. Design of a Parallel AES for Graphic Hardware using the CUDA framework.
In IEEE International Symposium on Parallel & Distributed Processing (IPDPS’09).
IEEE, Rome Italy. https://doi.org/0.1109/IPDPS.2009.5161242
[26]
Andrew Bortz and Dan Boneh. 2007. Exposing Private Information by Timing
Web Applications. In Proceedings of the 16th International Conference on World
Wide Web (WWW ’07). ACM, New York, NY, USA, 621–628. https://doi.org/10.
1145/1242572.1242656
[27]
Prima Chairunnanda, Num Pham, and Urs Hengartner. 2011. Privacy: Gone with
the Typing! Identifying Web Users by Their Typing Patterns. In IEEE International
Conference on Privacy, Security, Risk and Trust. 974–980.
[28]
Shuai Che, Michael Boyer, Jiayuan Meng, David Tarjan, Jeremy W. Sheaffer, Sang-
Ha Lee, and Kevin Skadron. 2009. Rodinia: A Benchmark Suite for Heterogeneous
Computing. In Proceedings of the 2009 IEEE International Symposium on Workload
Characterization (IISWC ’09). 44–54. https://doi.org/10.1109/IISWC.2009.5306797
[29]
Qi Alfred Chen, Zhiyun Qian, and Zhuoqing Morley Mao. 2014. Peeking into Your
App without Actually Seeing It: UI State Inference and Novel Android Attacks.
In USENIX Security Symposium. 1037–1052. https://dl.acm.org/citation.cfm?id=
2671291
[30]
N. L. Clarke and S. M. Furnell. 2006. Authenticating mobile phone users using
keystroke analysis. International Journal on Information Security 6 (Dec. 2006).
https://dl.acm.org/citation.cfm?id=1201686
[31]
Renan Correa Detomini, Renata Spolon Lobato, Roberta Spolon, and Marcos An-
tonio Cavenaghi. 2011. Using GPU to exploit parallelism on cryptography. In
6th Iberian Conference on Information Systems and Technologies (CISTI’11). IEEE,
Chaves Portugal. http://ieeexplore.ieee.org/document/5974171
[32]
Luke Durant. 2017. Inside Volta. Presentation at GPU-Tech. Accessed on-
line Feb. 2018 from http://on-demand.gputechconf.com/gtc/2017/presentation/
s7798-luke- durant-inside- volta.pdf .
[33]
Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh. 2016. Jump
over ASLR: Attacking Branch Predictors to Bypass ASLR. In The 49th Annual
IEEE/ACM International Symposium on Microarchitecture (MICRO-49). 1–13.
[34]
Dmitry Evtyushkin, Ryan Riley, Nael CSE Abu-Ghazaleh, ECE, and Dmitry Pono-
marev. 2018. BranchScope: A New Side-Channel Attack on Directional Branch
Predictor. In Proceedings of the Twenty-Third International Conference on Architec-
tural Support for Programming Languages and Operating Systems (ASPLOS ’18).
ACM, New York, NY, USA, 693–707. https://doi.org/10.1145/3173162.3173204
[35]
Edward W.Felten and Michael A. Schneider. 2000. Timing Attacks on Web Privacy.
In Proceedings of the 7th ACM Conference on Computer and Communications
Security (CCS ’00). ACM, New York, NY, USA, 25–32. https://doi.org/10.1145/
352600.352606
[36]
Pietro Frigo, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi. 2018. Grand
Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. In Proceed-
ings of IEEE Symposium on Security and Privacy. 357–372. https://doi.org/10.
1109/SP.2018.00022
[37]
Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, and Berk Sunar. 2017.
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. In
Computer Security – ESORICS 2017, Simon N. Foley, Dieter Gollmann, and Einar
Snekkenes (Eds.). Springer International Publishing, Cham, 80–97.
[38]
Jamie Hayes and George Danezis. 2016. k-fingerprinting: A Robust Scalable
Website Fingerprinting Technique. In USENIX Security Symposium. 1187–1203.
[39]
Suman Jana and Vitaly Shmatikov. 2012. Memento: Learning Secrets from Process
Footprints. In Proceedings of the 2012 IEEE Symposium on Security and Privacy
(SP ’12). IEEE Computer Society, Washington, DC, USA, 143–157. https://doi.
org/10.1109/SP.2012.19
[40]
Zhen Hang Jiang, Yunsi Fei, and David Kaeli. 2016. A complete key recovery
timing attack on a GPU. In IEEE International Symposium on High Performance
Computer Architecture (HPCA’16). IEEE, Barcelona Spain, 394–405. https://doi.
org/10.1109/HPCA.2016.7446081
[41]
Zhen Hang Jiang, Yunsi Fei, and David Kaeli. 2017. A Novel Side-Channel Timing
Attack on GPUs. In Proceedings of the on Great Lakes Symposium on VLSI (VLSI’17).
167–172. https://doi.org/10.1145/3060403.3060462
[42]
Mehmet Kayaalp, Khaled N Khasawneh, Hodjat Asghari Esfeden, Jesse Elwell,
Nael Abu-Ghazaleh, Dmitry Ponomarev, and Aamer Jaleel. 2017. RIC: Relaxed
Inclusion Caches for Mitigating LLC Side-Channel Attacks. In Proceedings of the
54th Annual Design Automation Conference (DAC). https://dl.acm.org/citation.
cfm?id=3062313
[43]
Mehmet Kayaalp, Dmitry Ponomarev, Nael Abu-Ghazaleh, and Aamer Jaleel.
2016. A high-resolution side-channel attack on last-level cache. In 53nd
ACM/EDAC/IEEE Design Automation Conference (DAC). 1–6. https://doi.org/10.
1145/2897937.2897962
[44]
Ron Kohavi. 1995. A study of cross-validation and bootstrap for accuracy estima-
tion and model selection. In International Joint Conference on Artificial Intelligence
(IJCAI), Vol. 14. 1137–1145. https://dl.acm.org/citation.cfm?id=1643047
[45]
Robert Kotcher, Yutong Pei, Pranjal Jumde, and Collin Jackson. 2013. Cross-
origin pixel stealing: timing attacks using CSS filters. In ACM Conference on
Computer and Communications Security. 1055–1062. https://doi.org/10.1145/
2508859.2516712
[46]
Sangho Lee, Youngsok Kim, Jangwoo Kim, and Jong Kim. 2014. Stealing Webpage
Rendered on your Browser by Exploiting GPU Vulnerabilities. In IEEE Symposium
on Security and Privacy (SPI’14). IEEE, San Jose CA USA, 19–33. https://doi.org/
10.1109/SP.2014.9
[47]
Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice,
and Stefan Mangard. 2017. Practical Keystroke Timing Attacks in Sandboxed