NIST CSF-2.0 Compliant GPU Shader Execution
-
Published:2024-08-02
Issue:4
Volume:14
Page:15187-15193
-
ISSN:1792-8036
-
Container-title:Engineering, Technology & Applied Science Research
-
language:
-
Short-container-title:Eng. Technol. Appl. Sci. Res.
Author:
Lungu Nelson,Al Rababah Ahmad Abdulqadir,Dash Bibhuti Bhusan,Syed Asif Hassan,Barik Lalbihari,Rout Suchismita,Tembo Simon,Lubobya Charles,Patra Sudhansu Shekhar
Abstract
This article introduces a mechanism for ensuring trusted GPU shader execution that adheres to the NIST Cybersecurity Framework (CSF) 2.0 standard. The CSF is a set of best practices for reducing cybersecurity risks. We focus on the CSF’s identification, protection, detection, and response mechanisms for GPU-specific security. To this end, we exploit recent advancements in side-channel analysis and hardware-assisted security for the real-time and introspective monitoring of shader execution. We prototype our solution and measure its performance across different GPU platforms. The evaluation results demonstrate the effectiveness of the proposed mechanism in detecting anomalous shader behaviors that only incur modest overhead at runtime. Integrating the CSF 2.0 principles into the proposed GPU shader pipeline leads to an organizational recipe for securing heterogeneous computing resources.
Publisher
Engineering, Technology & Applied Science Research
Reference21 articles.
1. W. J. Dally, S. W. Keckler, and D. B. Kirk, "Evolution of the Graphics Processing Unit (GPU)," IEEE Micro, vol. 41, no. 6, pp. 42–51, Aug. 2021. 2. D. G. Mahmoud, V. Lenders, and M. Stojilovic, "Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era," ACM Computing Surveys, vol. 55, no. 3, Oct. 2022, Art. no. 58. 3. W. Zhang, F. Bastani, I.-L. Yen, K. Hulin, F. Bastani, and L. Khan, "Real-Time Anomaly Detection in Streams of Execution Traces," in 14th International Symposium on High-Assurance Systems Engineering, Omaha, NE, USA, Oct. 2012, pp. 32–39. 4. A. Chen et al., "Detecting covert timing channels with time-deterministic replay," in 11th USENIX conference on Operating Systems Design and Implementation, Berkeley, CA, USA, Oct. 2014, pp. 541–554. 5. M. Chiappetta, E. Savas, and C. Yilmaz, "Real time detection of cache-based side-channel attacks using hardware performance counters," Applied Soft Computing, vol. 49, pp. 1162–1174, Dec. 2016.
|
|