Microarchitectural attacks in heterogeneous systems: A survey

H Naghibijouybari, EM Koruyeh… - ACM Computing …, 2022 - dl.acm.org
With the increasing proliferation of hardware accelerators and the predicted continued
increase in the heterogeneity of future computing systems, it is necessary to understand the …

{SecSMT}: Securing {SMT} processors against {Contention-Based} covert channels

M Taram, X Ren, A Venkat, D Tullsen - 31st USENIX Security Symposium …, 2022 - usenix.org
This paper presents the first comprehensive analysis of contention-based security
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …

Leaky buddies: Cross-component covert channels on integrated CPU-GPU systems

SB Dutta, H Naghibijouybari… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
Graphics Processing Units (GPUs) are ubiquitous components used across the range of
today's computing platforms, from phones and tablets, through personal computers, to high …

Network-on-chip microarchitecture-based covert channel in gpus

J Ahn, J Kim, H Kasan, L Delshadtehrani… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
As GPUs are becoming widely deployed in the cloud infrastructure to support different
application domains, the security concerns of GPUs are becoming increasingly important. In …

Neurobfuscator: A full-stack obfuscation tool to mitigate neural architecture stealing

J Li, Z He, AS Rakin, D Fan… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Neural network stealing attacks have posed grave threats to neural network model
deployment. Such attacks can be launched by extracting neural architecture information …

Common counters: Compressed encryption counters for secure GPU memory

S Na, S Lee, Y Kim, J Park, J Huh - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Hardware-based trusted execution has opened a promising new opportunity for enabling
secure cloud computing. Nevertheless, the current trusted execution environments are …

T unne L s for B ootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG

Z Zhang, T Allen, F Yao, X Gao, R Ge - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Recent studies have revealed much detailed information about the translation lookaside
buffers (TLBs) of modern CPUs, but we find that many properties of such components in …

Webgpu-spy: Finding fingerprints in the sandbox through gpu cache attacks

E Ferguson, A Wilson, H Naghibijouybari - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Microarchitectural attacks on CPU structures have been studied in native applications, as
well as in web browsers. These attacks continue to be a substantial threat to computing …

Guardian: Safe GPU Sharing in Multi-Tenant Environments

M Pavlidakis, G Vasiliadis, S Mavridis… - Proceedings of the 25th …, 2024 - dl.acm.org
Modern GPU applications, such as machine learning (ML), can only partially utilize GPUs,
leading to GPU underutilization in cloud environments. Sharing GPUs across multiple …

Spy in the GPU-box: Covert and side channel attacks on multi-GPU systems

SB Dutta, H Naghibijouybari, A Gupta… - Proceedings of the 50th …, 2023 - dl.acm.org
The deep learning revolution has been enabled in large part by GPUs, and more recently
accelerators, which make it possible to carry out computationally demanding training and …