Testing side-channel security of cryptographic implementations against future microarchitectures

G Barthe, M Böhme, S Cauligi… - Proceedings of the …, 2024 - dl.acm.org
How will future microarchitectures impact the security of existing cryptographic
implementations? As we cannot keep reducing the size of transistors, chip vendors have …

[PDF][PDF] Power-Related Side-Channel Attacks using the Android Sensor Framework

M Oberhuber, M Unterguggenberger… - … 2025: NDSS 2025, 2025 - andreaskogler.com
Software-based power side-channel attacks are a significant security threat to modern
computer systems, enabling adversaries to extract confidential information. Existing attacks …

Uncovering Real GPU NoC Characteristics: Implications on Interconnect Architecture

Z Jin, C Rocca, J Kim, H Kasan, M Rhu… - 2024 57th IEEE/ACM …, 2024 - ieeexplore.ieee.org
A critical component of high-throughput processors such as GPUs is the network-on-chip
(NoC) that interconnects the large number of cores and the memory partitions together. In …

Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions

Q Wang, D Oswald - arXiv preprint arXiv:2408.11601, 2024 - arxiv.org
In recent years, the widespread informatization and rapid data explosion have increased the
demand for high-performance heterogeneous systems that integrate multiple computing …

Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs

FD Pustelnik, XM Saß, JP Seifert - arXiv preprint arXiv:2401.08881, 2024 - arxiv.org
Graphic Processing Units (GPUs) have transcended their traditional use-case of rendering
graphics and nowadays also serve as a powerful platform for accelerating ubiquitous, non …

Precision Countermeasures for GPU Side Channels Using Shader Execution Pattern Analysis

N Lungu, S Tembo, GC Sasmal, S Rout… - … For Internet of …, 2024 - ieeexplore.ieee.org
Graphics Processing Units (GPUs) have become increasingly susceptible to side-channel
attacks, compromising the security of sensitive information processed on these devices. This …

LeftoverLocals: Listening to LLM Responses Through Leaked GPU Local Memory

T Sorensen, H Khlaaf - arXiv preprint arXiv:2401.16603, 2024 - arxiv.org
This paper describes LeftoverLocals: a vulnerability that allows data recovery from GPU
memory created by another process on Apple, Qualcomm, and AMD GPUs. LeftoverLocals …

[PDF][PDF] G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels

B Bourassa, Y Michalevsky, S Eskandarian - cs.unc.edu
Compression side channel attacks target systems that compress data before encrypting it.
By taking advantage of the fact that compression causes message lengths to be connected …