DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Ohmin | ko |
dc.contributor.author | Kim, Yonggon | ko |
dc.contributor.author | Huh, Jaehyuk | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.date.accessioned | 2021-07-30T05:10:36Z | - |
dc.date.available | 2021-07-30T05:10:36Z | - |
dc.date.created | 2019-10-18 | - |
dc.date.created | 2019-10-18 | - |
dc.date.issued | 2021-07 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.4, pp.1974 - 1988 | - |
dc.identifier.issn | 1545-5971 | - |
dc.identifier.uri | http://hdl.handle.net/10203/286947 | - |
dc.description.abstract | In the last decade, the dedicated graphics processing unit (GPU) has emerged as an architecture for high-performance computing workloads. Recently, researchers have also focused on the isolation property of a dedicated GPU and suggested GPU-based secure computing environments with several promising applications. However, despite the security analysis conducted by the prior studies, it has been unclear whether a dedicated GPU can be leveraged as a secure processor in the presence of a kernel-privileged attacker. In this paper, we first demonstrate the security of dedicated GPUs through comprehensive studies on context information for GPU execution. The paper shows that a kernel-privileged attacker can manipulate the GPU contexts to redirect memory accesses or execute arbitrary GPU codes on the running GPU kernel. Based on the security analysis, this paper proposes a new on-chip execution model for the dedicated GPU and a novel defense mechanism supporting the security of the on-chip execution. With comprehensive evaluation, the paper assures that the proposed solutions effectively isolate sensitive data in on-chip storages and defend against known attack vectors from a privileged attacker, supporting that the commodity GPUs can be leveraged as a secure processor. | - |
dc.language | English | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | ZeroKernel: Secure Context-isolated Execution on Commodity GPUs | - |
dc.type | Article | - |
dc.identifier.wosid | 000671788500034 | - |
dc.identifier.scopusid | 2-s2.0-85112070970 | - |
dc.type.rims | ART | - |
dc.citation.volume | 18 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 1974 | - |
dc.citation.endingpage | 1988 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | - |
dc.identifier.doi | 10.1109/TDSC.2019.2946250 | - |
dc.contributor.localauthor | Huh, Jaehyuk | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Kim, Yonggon | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Graphics processing units | - |
dc.subject.keywordAuthor | Kernel | - |
dc.subject.keywordAuthor | Context | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | System-on-chip | - |
dc.subject.keywordAuthor | Registers | - |
dc.subject.keywordAuthor | Computer architecture | - |
dc.subject.keywordAuthor | Graphics processors | - |
dc.subject.keywordAuthor | reverse engineering | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | on-chip execution | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.