首页> 外文会议>IEEE International Symposium on High Performance Computer Architecture >RCoal: Mitigating GPU Timing Attack via Subwarp-Based Randomized Coalescing Techniques
【24h】

RCoal: Mitigating GPU Timing Attack via Subwarp-Based Randomized Coalescing Techniques

机译:RCoal:通过基于子扭曲的随机合并技术减轻GPU计时攻击

获取原文

摘要

Graphics processing units (GPUs) are becoming default accelerators in many domains such as high-performance computing (HPC), deep learning, and virtual/augmented reality. Recently, GPUs have also shown significant speedups for a variety of security-sensitive applications such as encryptions. These speedups have largely benefited from the high memory bandwidth and compute throughput of GPUs. One of the key features to optimize the memory bandwidth consumption in GPUs is intra-warp memory access coalescing, which merges memory requests originating from different threads of a single warp into as few cache lines as possible. However, this coalescing feature is also shown to make the GPUs prone to the correlation timing attacks as it exposes the relationship between the execution time and the number of coalesced accesses. Consequently, an attacker is able to correctly reveal an AES private key via repeatedly gathering encrypted data and execution time on a GPU. In this work, we propose a series of defense mechanisms to alleviate such timing attacks by carefully trading off performance for improved security. Specifically, we propose to randomize the coalescing logic such that the attacker finds it hard to guess the correct number of coalesced accesses generated. To this end, we propose to randomize: a) the granularity (called as subwarp) at which warp threads are grouped together for coalescing, and b) the threads selected by each subwarp for coalescing. Such randomization techniques result in three mechanisms: fixed-sized subwarp (FSS), random-sized subwarp (RSS), and random-threaded subwarp (RTS). We find that the combination of these security mechanisms offers 24- to 961-times improvement in the security against the correlation timing attacks with 5 to 28% performance degradation.
机译:图形处理单元(GPU)已成为许多领域的默认加速器,例如高性能计算(HPC),深度学习和虚拟/增强现实。最近,GPU还显示出对各种安全敏感型应用(例如加密)的显着提速。这些加速很大程度上得益于GPU的高内存带宽和计算吞吐量。优化GPU中​​内存带宽消耗的关键功能之一是翘曲内存访问合并,它将合并来自单个翘曲不同线程的内存请求合并到尽可能少的缓存行中。但是,由于显示了执行时间与合并访问次数之间的关系,该合并功能还显示出使GPU易于受到相关定时攻击的影响。因此,攻击者能够通过在GPU上反复收集加密数据和执行时间来正确揭示AES私钥。在这项工作中,我们提出了一系列防御机制,通过仔细权衡性能以提高安全性来减轻这种定时攻击。具体来说,我们建议对合并逻辑进行随机化处理,以使攻击者很难猜测所生成的合并访问的正确数量。为此,我们建议将以下各项随机化:a)将经纱分组在一起以进行合并的粒度(称为子经纱),以及b)每个子经纱所选择的用于合并的线程。这种随机化技术产生三种机制:固定大小的子扭曲(FSS),随机大小的子扭曲(RSS)和随机线程的子扭曲(RTS)。我们发现,这些安全机制的组合可在针对相关定时攻击的安全性方面提高24到961倍,而性能下降5到28%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号