View : 475 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author윤명국*
dc.date.accessioned2023-01-04T16:31:13Z-
dc.date.available2023-01-04T16:31:13Z-
dc.date.issued2022*
dc.identifier.issn2169-3536*
dc.identifier.otherOAK-32577*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/263007-
dc.description.abstractArchitectural considerations for secure executions are getting more critical for GPU since popular security applications and libraries have been ported to a GPU domain to rely on GPU's massively parallel computations. Recent studies disclosed the security attack models that exploit GPU's architectural vulnerabilities to leak the secret keys of AES. The attack models exploit the high correlations between the execution time of a kernel and the number of memory requests generated from memory coalescing. Thus the prior architectural defenses provide secure executions by randomizing or restricting the memory coalescing from load warps. However, those defense approaches result in significant performance overhead since memory coalescing is an essential feature for improving the performance of GPU. In this paper, we propose GhostLeg, an efficient architectural defense approach against correlation-based GPU security attacks. GhostLeg selectively applies secure executions for load warps to minimize performance overhead induced by concealing memory coalescing behavior. Our analysis of AES reveals that only the load warps whose index addresses are influenced by secret keys are vulnerable to security attacks. In order to minimize the performance overhead by secure executions, GhostLeg pinpoints the load warps that require secure executions based on the class of a source register. The secure flag assigned to each register can be set by propagation from non-deterministic user data (GhostLeg-ND) or a specific directive marked by programmers (GhostLeg-Key). Our evaluation shows that GhostLeg guarantees secure executions against the correlation-based attacks and GhostLeg-ND exhibits 54.7% higher performance compared to the state-of-the-art GPU defense solution.*
dc.languageEnglish*
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC*
dc.subjectGraphics processing units*
dc.subjectInstruction sets*
dc.subjectComputer architecture*
dc.subjectRegisters*
dc.subjectRandom access memory*
dc.subjectSecurity*
dc.subjectMemory management*
dc.subjectGPU*
dc.subjectsecure architecture*
dc.subjectsecurity attack*
dc.subjectmemory coalescing*
dc.titleGhostLeg: Selective Memory Coalescing for Secure GPU Architecture*
dc.typeArticle*
dc.relation.volume10*
dc.relation.indexSCIE*
dc.relation.indexSCOPUS*
dc.relation.startpage111449*
dc.relation.lastpage111462*
dc.relation.journaltitleIEEE ACCESS*
dc.identifier.doi10.1109/ACCESS.2022.3216325*
dc.identifier.wosidWOS:000873686200001*
dc.author.googleLee, Jongmin*
dc.author.googleJung, Seungho*
dc.author.googleSuh, Taeweon*
dc.author.googleOh, Yunho*
dc.author.googleYoon, Myung Kuk*
dc.author.googleKoo, Gunjae*
dc.contributor.scopusid윤명국(55646629400)*
dc.date.modifydate20240322133856*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE