Understanding the security of discrete GPUs

34Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.

Abstract

GPUs have become an integral part of modern systems, but their implications for system security are not yet clear. This paper demonstrates both that discrete GPUs cannot be used as secure co-processors and that GPUs provide a stealthy platform for malware. First, we examine a recent proposal to use discrete GPUs as secure co-processors and show that the security guarantees of the proposed system do not hold on the GPUs we investigate. Second, we demonstrate that (under certain circumstances) it is possible to bypass IOMMU protections and create stealthy, long-lived GPU-based malware. We demonstrate a novel attack that compromises the in-kernel GPU driver and one that compromises GPU microcode to gain full access to CPU physical memory. In general, we find that the highly sophisticated, but poorly documented GPU hardware architecture, hidden behind obscure close-source device drivers and vendor-specific APIs, not only make GPUs a poor choice for applications requiring strong security, but also make GPUs into a security threat.

Cite

CITATION STYLE

APA

Zhu, Z., Kim, S., Rozhanski, Y., Hu, Y., Witchel, E., & Silberstein, M. (2017). Understanding the security of discrete GPUs. In Proceedings of the General Purpose GPUs, GPGPU-10 2017 (pp. 1–11). Association for Computing Machinery, Inc. https://doi.org/10.1145/3038228.3038233

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free