New GPU Side-Channel Attack Risks Data Leakage

29 views 1 minutes read

New GPU Side-Channel Attack Risks Data Leakage: A recently published research paper reveals a concerning side-channel attack that threatens the security of modern GPU cards.

This news item explores the implications of this attack, how it was discovered, and the vulnerable GPUs from major manufacturers.

Key Takeaways to New GPU Side-Channel Attack Risks Data Leakage:

  • GPU Vulnerability Unveiled: A new side-channel attack, known as “GPU.zip,” has been identified by researchers from four prominent American universities. This vulnerability can be exploited by malicious actors when a user visits a compromised website.
  • Undocumented Compression Risk: The attack hinges on undocumented compression methods used by GPU vendors like Intel and AMD. These compressions occur even when software does not explicitly request them. Such compressions can lead to data-dependent memory traffic and cache utilization, opening avenues for side-channel analysis.
  • Data Theft Potential: The attack’s significance lies in its potential to leak sensitive visual data bit by bit. By exploiting secret-dependent compressibility, attackers can exfiltrate data from HTTP/HTTPS requests and responses, reading information pixel by pixel. While the attack may require patience, it boasts high accuracy, making it a substantial threat.

Unmasking the GPU Side-Channel Vulnerability

A research paper authored by Yingchen Wang et. al. sheds light on this GPU side-channel attack. It is rooted in the little-known compression techniques employed by major GPU manufacturers such as Intel and AMD.

These compressions, utilized for memory bandwidth optimization and performance enhancement, can inadvertently expose data through side-channel analysis.

The Compression Conundrum

Compression techniques, while beneficial for performance, can become a double-edged sword.

The research paper underscores that compression-induced data-dependent DRAM traffic and cache utilization can be measured through side-channel analysis, providing attackers with the means to leak secrets.

Attacker’s Advantage

The attack’s real-world demonstration involved stealing usernames via an iframe on the Wikipedia site. Notably, the Ryzen side-channel attack yielded results within 30 minutes, while Intel GPUs took 215 minutes.

Despite the time investment, the attacks achieved impressively high accuracies of 97% and 98.3%, respectively.

New GPU Side-Channel Attack Risks Data Leakage
New GPU Side-Channel Attack Risks Data Leakage 15

Vigilance in a Vulnerable Landscape

As this GPU side-channel vulnerability comes to light, it underscores the need for heightened cybersecurity measures. The risk of data leakage, particularly sensitive visual data, poses a significant concern.

Users and organizations must remain vigilant and consider security updates to mitigate this emerging threat.

About the Researchers: The research paper detailing the GPU side-channel attack was authored by researchers from prominent American universities, including the University of Texas at Austin, Carnegie Mellon University, the University of Washington, and the University of Illinois. Their work highlights the critical need for addressing vulnerabilities in GPU technology to bolster cybersecurity measures.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2023 – All Right Reserved | Designed & Powered by HostAdvocate

CyberSecurityCue (Cyber Security Cue) Logo
CyberSecurityCue Logo 150X150

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More