Karimi et al., 2020 - Google Patents
Hardware/software obfuscation against timing side-channel attack on a GPUKarimi et al., 2020
View PDF- Document ID
- 18391861570291509361
- Author
- Karimi E
- Fei Y
- Kaeli D
- Publication year
- Publication venue
- 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
External Links
Snippet
GPUs are increasingly being used in security applications, especially for accelerating encryption/decryption. While GPUs are an attractive platform in terms of performance, the security of these devices raises a number of concerns. One vulnerability is the data …
- 230000001965 increased 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/30—Arrangements for executing machine-instructions, e.g. instruction decode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
- G06F17/141—Discrete Fourier transforms
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Brasser et al. | DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization | |
| Tan et al. | PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. | |
| Purnal et al. | Systematic analysis of randomization-based protected cache architectures | |
| Wichelmann et al. | Microwalk: A framework for finding side channels in binaries | |
| Karimi et al. | Hardware/software obfuscation against timing side-channel attack on a GPU | |
| Jiang et al. | A novel side-channel timing attack on gpus | |
| Crane et al. | Thwarting cache side-channel attacks through dynamic software diversity. | |
| Liu et al. | Newcache: Secure cache architecture thwarting cache side-channel attacks | |
| Kayaalp et al. | A high-resolution side-channel attack on last-level cache | |
| Gassend et al. | Caches and hash trees for efficient memory integrity verification | |
| Jiang et al. | A complete key recovery timing attack on a GPU | |
| Henson et al. | Memory encryption: A survey of existing techniques | |
| Karimi et al. | A timing side-channel attack on a mobile gpu | |
| Hossain et al. | Hexon: Protecting firmware using hardware-assisted execution-level obfuscation | |
| Brasser et al. | DR. SGX: hardening SGX enclaves against cache attacks with data location randomization | |
| Jiang et al. | Exploiting bank conflict-based side-channel timing leakage of gpus | |
| Kadam et al. | Bcoal: Bucketing-based memory coalescing for efficient and secure gpus | |
| Schlüter et al. | Fetchbench: Systematic identification and characterization of proprietary prefetchers | |
| Yudha et al. | LITE: a low-cost practical inter-operable GPU TEE | |
| Shi et al. | Authentication control point and its implications for secure processor design | |
| Dhavlle et al. | Imitating functional operations for mitigating side-channel leakage | |
| Liu et al. | Can randomized mapping secure instruction caches from side-channel attacks? | |
| Wang | Information leakage due to cache and processor architectures | |
| Bao et al. | Reducing timing side-channel information leakage using 3D integration | |
| Domnitser et al. | A predictive model for cache-based side channels in multicore and multithreaded microprocessors |