Abstract | ||
---|---|---|
GPUs have been widely used in multi-user environments such as the cloud due to its rich thread-level parallelism. In such an environment, multiple kernels can execute in parallel. However, it is possible that a kernel leverages buffer overflow to attack other kernels on the same GPU. The limited existing work focuses on the detection of buffer overflows instead of prevention. Address randomization is an effective approach to preventing memory-related attacks on the CPU. However, current GPUs lack similar support to defend the increasing threats of memory overflow. In this paper, we propose an address randomization method for dynamic memory allocation on the GPU. We have implemented and compared different pseudo-random algorithms on the GPU, and integrated the address randomization into an existing allocator. Elaborate discussions are presented to analyze the security of our proposed address randomization. Experimental evaluations show that the overhead incurred by our randomized algorithm is less than 20% on top of existing memory allocators. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/HPCC/SmartCity/DSS.2019.00088 | 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) |
Keywords | Field | DocType |
Address Randomization,Buffer Overflow,GPU,CUDA | Dynamic random-access memory,Randomized algorithm,Central processing unit,C dynamic memory allocation,Computer science,CUDA,Allocator,Distributed computing,Cloud computing,Buffer overflow | Conference |
ISBN | Citations | PageRank |
978-1-7281-2059-1 | 0 | 0.34 |
References | Authors | |
0 | 7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Can Peng | 1 | 2 | 0.70 |
Chenlin Huang | 2 | 48 | 8.83 |
Daokun Hu | 3 | 1 | 2.04 |
Bang Di | 4 | 7 | 2.47 |
Jianhua Sun | 5 | 192 | 25.27 |
Hao Chen | 6 | 14 | 5.59 |
Xionghu Zhong | 7 | 2 | 1.03 |