In this paper, we present that security threats coming with existing GPU memory management strategy are overlooked, which opens a back door for adversaries to freely break the memory isolation: they enable adversaries without any privilege in a computer to recover the raw memory data left by previous processes directly. More importantly, such attacks can work on not only normal multi-user operating systems, but also cloud computing platforms. To demonstrate the seriousness of such attacks, we recovered original data directly from GPU memory residues left by exited commodity applications, including Google Chrome, Adobe Reader, GIMP, Matlab. The results show that, because of the vulnerable memory management strategy, commodity applications in our experiments are all affected.
翻译:在本文中,我们指出,现有GPU记忆管理战略带来的安全威胁被忽视了,这为对手自由打破记忆隔离打开了后门:它们使在计算机中没有任何特权的对手能够直接收回先前过程留下的原始记忆数据。更重要的是,这种攻击不仅可以对正常的多用户操作系统起作用,而且可以对云计算平台起作用。为了证明这种攻击的严重性,我们直接从Google Chrome、Adobe Reader、GIMP、Matlab等商品应用软件退出后留下的GPU记忆残留物中找到原始数据。结果显示,由于脆弱的记忆管理战略,我们实验中的商品应用都受到影响。