【24h】

Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages

机译:基于电磁泄漏的基于GPU的AES实现的缓存冲突攻击

获取原文
获取原文并翻译 | 示例

摘要

For computationally-intensive tasks like cryptographic applications, GPU is thought to be an ideal platform due to its parallel computing power. However, some vulnerabilities of GPU have been published due to overflow attacks, covert-channel attacks and side-channel attacks. In this work, for the first time, we investigate cache-collision attacks on GPU-based AES implementation utilizing Electro-Magnetic (EM) leakages. We construct a much efficient leakage model based on generalized simultaneous cache-collision in multi-threads scenarios, and we mount a key-recovery attack with Differential Electro-Magnetic Analysis (DEMA). Our evaluation results show that the 16-byte secret key of GPU-based AES implementation can be recovered with only 5,000 EM traces, and 600 EM traces are enough when assisted with appropriate key enumeration algorithm (KEA). This work suggests that cache-collision on GPU does give rise to leakages via EM side-channels and it should be considered in the design of secure GPU-based cryptographic implementations.
机译:对于诸如加密应用程序之类的计算密集型任务,由于其并行计算能力,GPU被认为是理想的平台。但是,由于溢出攻击,隐蔽通道攻击和侧通道攻击,已经发布了一些GPU漏洞。在这项工作中,我们第一次研究了利用电磁(EM)泄漏的基于GPU的AES实现的缓存冲突攻击。我们在多线程方案中基于广义同时缓存冲突构建了一个高效的泄漏模型,并使用差分电磁分析(DEMA)发起了密钥恢复攻击。我们的评估结果表明,基于GPU的AES实现的16字节秘密密钥仅需5,000条EM跟踪就可以恢复,而借助适当的密钥枚举算法(KEA)可以恢复600条EM跟踪。这项工作表明,GPU上的缓存冲突确实会导致通过EM边通道的泄漏,因此在基于安全GPU的加密实现设计中应考虑这一点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号