首页> 外文会议>IEEE Symposium on Security and Privacy >Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities
【24h】

Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities

机译:利用GPU漏洞窃取浏览器上呈现的网页

获取原文

摘要

Graphics processing units (GPUs) are important components of modern computing devices for not only graphics rendering, but also efficient parallel computations. However, their security problems are ignored despite their importance and popularity. In this paper, we first perform an in-depth security analysis on GPUs to detect security vulnerabilities. We observe that contemporary, widely-used GPUs, both NVIDIA's and AMD's, do not initialize newly allocated GPU memory pages which may contain sensitive user data. By exploiting such vulnerabilities, we propose attack methods for revealing a victim program's data kept in GPU memory both during its execution and right after its termination. We further show the high applicability of the proposed attacks by applying them to the Chromium and Firefox web browsers which use GPUs for accelerating webpage rendering. We detect that both browsers leave rendered webpage textures in GPU memory, so that we can infer which web pages a victim user has visited by analyzing the remaining textures. The accuracy of our advanced inference attack that uses both pixel sequence matching and RGB histogram matching is up to 95.4%.
机译:图形处理单元(GPU)是现代计算设备的重要组件,不仅用于图形渲染,而且还用于高效的并行计算。然而,尽管它们的重要性和受欢迎度,但它们的安全问题却被忽略了。在本文中,我们首先对GPU进行了深入的安全性分析,以检测安全性漏洞。我们观察到,当代的,广泛使用的NVIDIA(包括NVIDIA和AMD)的GPU不会初始化可能包含敏感用户数据的新分配的GPU内存页面。通过利用此类漏洞,我们提出了一种攻击方法,可用于在执行过程中以及终止后立即泄露保存在GPU内存中的受害程序的数据。通过将其应用于使用GPU来加速网页渲染的Chromium和Firefox Web浏览器,我们进一步展示了所提议攻击的高度适用性。我们检测到两个浏览器都将渲染的网页纹理留在GPU内存中,因此我们可以通过分析其余纹理来推断受害者用户访问了哪些网页。同时使用像素序列匹配和RGB直方图匹配的高级推理攻击的准确性高达95.4%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号