Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery

被引:13
作者
Ahn, Jaeguk [1 ]
Jin, Cheolgyu [1 ]
Kim, Jiho [1 ]
Rhu, Minsoo [1 ]
Fei, Yunsi [2 ]
Kaeli, David [2 ]
Kim, John [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Daejeon, South Korea
[2] Northeastern Univ, Boston, MA 02115 USA
来源
2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021) | 2021年
关键词
GPU; AES; side-channel attack; sectored-cache;
D O I
10.1109/HPCA51647.2021.00036
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Given the parallel processing capabilities of Graphics Processing Units (GPUs), many applications are exploiting GPUs and cryptographic systems have also begun to leverage GPUs to accelerate encryption/decryption. Recent work has identified how microarchitectural side-channel attacks can be carried out on AES (Advanced Encryption Standard) by exploiting the SIMT characteristics and memory coalescing of GPUs. In this work, we first show that previously proposed correlation-based side-channel attacks are not feasible on modern GPUs that support narrower data-cache accesses via a sectored-cache microarchitecture - resulting in memory accesses from different levels of the memory hierarchy. In comparison, we identify how negative timing correlation can occur in modern GPUs when data is fetched from different levels of the cache hierarchy. We then propose Trident - a hybrid cache-collision timing attack on GPUs that can fully recover all AES key bytes on modern GPUs. Cache collisions in GPUs present challenges due to the large number of threads and the number of samples required. To address these challenges, Trident consists of three different components - negative timing correlation, cache-collision attack, and chosen plaintext attack. We leverage the negative timing correlation to recover earlier key bytes of AES while exploiting cache-collision attacks for the latter AES key bytes. To enable GPU cache collision attacks, we exploit memory coalescing to control the number of memory accesses through chosen-plaintext attacks to significantly reduce the number of timing samples needed. Our proposed Trident attack results in over 10x reduction in the number of samples needed to recover the key bytes compared with prior work, while still being successful in full AES key recovery in modern GPUs. We also propose TridentShield - a latency-based countermeasure to the Trident attack that minimizes throughput degradation in GPUs.
引用
收藏
页码:332 / 344
页数:13
相关论文
共 49 条
[1]  
Abdelrahman AA, 2017, 2017 COMPUTING CONFERENCE, P1077, DOI 10.1109/SAI.2017.8252225
[2]  
Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P271
[3]  
[Anonymous], 2019, PASCAL TUNING GUIDE
[4]  
[Anonymous], KEPLER TUNING GUIDE
[5]  
[Anonymous], 1974, A Course in Probability Theory
[6]  
Bakhoda A, 2009, INT SYM PERFORM ANAL, P163, DOI 10.1109/ISPASS.2009.4919648
[7]  
Bernstein Daniel J., 2005, TECHNICAL REPORT
[8]  
Bogdanov A, 2010, LECT NOTES COMPUT SC, V5985, P235, DOI 10.1007/978-3-642-11925-5_17
[9]  
Bonneau J, 2006, LECT NOTES COMPUT SC, V4249, P201
[10]   Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers [J].
Camurati, Giovanni ;
Poeplau, Sebastian ;
Muench, Marius ;
Hayes, Tom ;
Francillon, Aurelien .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :163-177