Abstract
The encryption/decryption algorithms have been ported to GPU platforms to take advantage of the GPUs’ high-throughput computing capability. The downside of moving the cryptographic algorithms onto GPUs, however, is that the vulnerability of side-channel attacks for GPUs has not been well studied and the confidential information may be under a great risk by processing encryption on GPUs. In this paper, we proposed to leverage a profiling-based side-channel attack (SCA) to expose GPUs’ side-channel vulnerability and the weakness of security services provided by GPUs. Our results show that GPUs are particularly vulnerable to profiling-based side-channel attacks and need to be protected against side-channel threats. Especially, for AES-128, the proposed method can recover all key bytes in less than 1 min, outperforming all prior SCAs we know.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Biagio, A.D., Barenghi, A., Agosta, G., Pelosi, G.: Design of a parallel AES for graphics hardware using the CUDA framework. In: Proceedings of the 2009 IEEE International Symposium on Parallel and Distributed Processing, pp. 1–8. IEEE Computer Society (2009)
Cohen, A.E., Parhi, K.K.: GPU accelerated elliptic curve cryptography in GF(2m). In: 2010 53rd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 57–60. IEEE (2010)
Iwai, K., Kurokawa, T., Nisikawa, N.: AES encryption implementation on CUDA GPU and its analysis. In: 2010 First International Conference on Networking and Computing, pp. 209–214. IEEE (2010)
Le, D., Chang, J., Gou, X., Zhang, A., Lu, C.: Parallel AES algorithm for fast data encryption on GPU. In: 2010 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 6, p. V6-1. IEEE (2010)
Manavski, S.A., et al.: CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: Signal Processing and Communications 2007 (2007)
Jiang, Z.H., Fei, Y., Kaeli, D.: A complete key recovery timing attack on a GPU. In: 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp. 394–405. IEEE (2016)
Jiang, Z.H., Fei, Y.: A novel cache bank timing attack. In: Proceedings of the 36th International Conference on Computer-Aided Design, pp. 139–146. IEEE Press (2017)
Jiang, Z.H., Fei, Y., Kaeli, D.: A novel side-channel timing attack on GPUs. In: Proceedings of the Great Lakes Symposium on VLSI 2017, pp. 167–172. ACM (2017)
Luo, C., et al.: Power analysis attack of an AES GPU implementation. J. Hardw. Syst. Secur. 2(1), 69–82 (2018)
Luo, C., Fei, Y., Luo, P., Mukherjee, S., Kaeli, D.: Side-channel power analysis of a GPU AES implementation. In: 2015 33rd IEEE International Conference on Computer Design (ICCD), pp. 281–288. IEEE (2015)
Gao, Y., Cheng, W., Zhang, H., Zhou, Y.: Cache-collision attacks on GPU-based AES implementation with electro-magnetic leakages. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 300–306. IEEE (2018)
Kadam, G., Zhang, D., Jog, A.: RCoal: mitigating GPU timing attack via subwarp-based randomized coalescing techniques. In: 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp. 156–167. IEEE (2018)
Naghibijouybari, H., Neupane, A., Qian, Z., Abu-Ghazaleh, N.: Rendered insecure: GPU side channel attacks are practical. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2139–2153. ACM (2018)
Nvidia, C.: Programming Guide (2008)
Nvidia, C.: Nvidia’s next generation CUDA compute architecture: Fermi. Comput. Syst. 26, 63–72 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, X., Zhang, W. (2020). An Efficient Profiling-Based Side-Channel Attack on Graphics Processing Units. In: Choo, KK., Morris, T., Peterson, G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. https://doi.org/10.1007/978-3-030-31239-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-31239-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31238-1
Online ISBN: 978-3-030-31239-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)