• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

GPUs are vulnerable to 3 side-channel attacks

{{postValue.id}}

Recent research suggest GPUs are vulnerable to 3 side-channel attacks

Bad news for computer users everywhere. Last month, the researchers at the University of California in Riverside stated that GPUs (Graphics Processing Units) are vulnerable to side-channel attacks like Spectre and Meltdown which had plagued Intel and AMD CPUs.earlier this year. The research team consisted of two professors and two students, a computer science doctoral student and a post-doctoral researcher. The team reverse-engineered a Nvidia GPU to showcase three GPU attacks on graphics and computer stacks, and had stated that this was the first side channel attacks on GPUs.

Side-channel attacks happen when the attacker uses how a technology operates instead of doing it through a bug or flaw in the code. These attacks exploit the user counters in the GPU and since GPUSs are available in user mode anyone can access them.

What are those 3 GPU attacks?

All these 3 attacks happen only when a user (who in this case is a victim) downloads a malicious program to spy on their computer.

In the first attack, the user activity is tracked on the web as GPUs are used to render graphics in browsers. The downloaded malicious program uses OpenGL to create a spy program which records the behavior of the browser with GPU usage.

In the case of the second attack, the user passwords can be easily extracted since GPUs are used to render the login/password box

The third attack makes the data center vulnerable as it targets the computational applications. It uses the memory sniffing technique that is used for grabbing passwords, but here it uses a neutral network to learn and steal the network algorithms

Although there is no absolute solution, the researchers had recommended the users to turn off user-mode access to the counters to avoid the third attack, but it may not be a viable solution as many applications depend on that functionality

Tags:
daniel
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 0 )

No questions available

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Owen ?
How to add SSH key to my Gitlab account

I need to add the SSH key in my gitlab account. How to do so ????

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.