"In the second attack, the authors extracted user passwords. Each time the user types a character, the whole password textbox is uploaded to GPU as a texture to be rendered. Monitoring the interval time of consecutive memory allocation events leaked the number of password characters and inter-keystroke timing, well-established techniques for learning passwords."
"The third attack targets a computational application in the cloud. The attacker launches a malicious computational workload on the GPU which operates alongside the victim’s application. Depending on neural network parameters, the intensity and pattern of contention on the cache, memory and functional units differ over time, creating measurable leakage. The attacker uses machine learning-based classification on performance counter traces to extract the victim’s secret neural network structure, such as number of neurons in a specific layer of a deep neural network."
"In the future the group plans to test the feasibility of GPU side channel attacks on Android phones."
http://www.cs.ucr.edu/~zhiyunq/pub/ccs18_gpu_side_channel.pdf
- kohinoor blogja
- A hozzászóláshoz be kell jelentkezni
- 721 megtekintés
Hozzászólások
Térjünk vissza a karakteres soros terminálokra!
=====
tl;dr
Egy-két mondatban leírnátok, hogy lehet ellopni egy bitcoin-t?
- A hozzászóláshoz be kell jelentkezni
Szerintem gyujtsuk fel. Ami nincs azzal problema sincs. Neo ludditizmus. :)
- A hozzászóláshoz be kell jelentkezni
"All three attacks require the victim to first acquire a malicious program embedded in a downloaded app. The program is designed to spy on the victim’s computer."
Szóval le kell guglizni a szetáp ekszét és adminként lefuttatni. Kérem kapcsolja ki.
--
debian,libreelec,openmediavault,ubuntu,windows,arch,lineageOS
zbook/elitebook/rpi3/nexus5_hammerhead
- A hozzászóláshoz be kell jelentkezni