A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU
[article]
2020
arXiv
pre-print
GPUs are increasingly being used in security applications, especially for accelerating encryption/decryption. While GPUs are an attractive platform in terms of performance, the security of these devices raises a number of concerns. One vulnerability is the data-dependent timing information, which can be exploited by adversary to recover the encryption key. Memory system features are frequently exploited since they create detectable timing variations. In this paper, our attack model is a
arXiv:2007.16175v1
fatcat:oyuvuw3kbffd5kb2mpzveuyb5y