Article Details

Original Article Text

Click to Toggle View

Modern GPUs vulnerable to new GPU.zip side-channel attack. Researchers from four American universities have developed a new GPU side-channel attack that leverages data compression to leak sensitive visual data from modern graphics cards when visiting web pages. The researchers have demonstrated the effectiveness of this 'GPU.zip' attack by performing cross-origin SVG filter pixel-stealing attacks through the Chrome browser. The researchers disclosed the vulnerability to impacted video card manufacturers in March 2023. However, as of September 2023, no affected GPU vendors (AMD, Apple, Arm, NVIDIA, Qualcomm) or Google (Chrome) have rolled out patches to address the problem. The new flaw is outlined in a paper from researchers at the University of Texas at Austin, Carnegie Mellon University, University of Washington, and University of Illinois Urbana-Champaign and will appear in the 45th IEEE Symposium on Security and Privacy. Leaking through compression Generally, data compression creates distinct data-dependent DRAM traffic and cache utilization, which can be abused for leaking secrets, so software turns off compression when handling sensitive data. The GPU.zip researchers explain that all modern graphic processor units, especially integrated Intel and AMD chips, perform software-visible data compression even when not explicitly asked. Modern GPUs follow this risky practice as an optimization strategy, as it helps save on memory bandwidth and improve performance without software. This compression is often undocumented and vendor-specific, and the researchers have found a way to exploit it to leak visual data from GPUs. Specifically, they demonstrated an attack that extracts individual pixel data through a web browser on various devices and GPU architectures, as shown below. The proof-of-concept attack demonstrates stealing the username from a Wikipedia iframe, which is possible within 30 minutes on Ryzen and 215 minutes on Intel GPUs, at accuracies of 97% and 98.3%, respectively. The iframe hosts a cross-origin webpage whose pixels are isolated and turned into binary, meaning they're converted into two possible colors. Next, these pixels are enlarged, and a specialized SVG filter stack is applied to create textures that are either compressible or not. By measuring the time taken for the texture to render, the researchers can deduce the original color/state of the target pixel. We have recently seen the application of SVG filters to induce data-dependent execution and the use of JavaScript to measure computation time and frequency to discern the pixel's color on the "Hot Pixels" attack. While Hot Pixels exploits data-dependent computation times on modern processors, GPU.zip hinges on undocumented GPU data compression to achieve similar results. GPU.zip severity GPU.zip impacts almost all major GPU manufacturers, including AMD, Apple, Arm, Intel, Qualcomm, and NVIDIA, but not all cards are equally affected. The fact that none of the impacted vendors have decided to fix the issue by optimizing their data compression approach and limiting its operation to non-sensitive cases further raises the risk. Although GPU.zip potentially impacts the vast majority of laptops, smartphones, tablets, and desktop PCs worldwide, the immediate impact on users is moderated by the complexity and time required to perform the attack. Also, websites that deny cross-origin iframe embedding cannot be used for leaking user data through this or similar side-channel attacks. "Most sensitive websites already deny being embedded by cross-origin websites. As a result, they are not vulnerable to the pixel stealing attack we mounted using GPU.zip," explains the researchers in a FAQ on the team's website. Finally, the researchers note that Firefox and Safari do not meet all the criteria needed for GPU.zip to work, such as allowing cross-origin iframes to be loaded with cookies, rendering SVG filters on iframes, and delegating rendering tasks to the GPU.

Daily Brief Summary

CYBERCRIME // Researchers Unveil New "GPU.zip" Side-Channel Attack Exploiting Unpatched GPU Vulnerability

Researchers from four American universities have discovered a novel side-channel attack, termed 'GPU.zip', that leverages data compression to extract sensitive visual data from modern graphics cards while browsing websites.

The method was tested using the Chrome browser and involved cross-origin Scalable Vector Graphics (SVG) filter pixel-stealing attacks.

Graphic Processor Unit (GPU) vendors including AMD, Apple, NVIDIA, and Qualcomm were alerted to the vulnerability in March 2023; however, no patches have been issued as of September 2023.

All modern GPUs, especially integrated Intel and AMD chips, perform software-visible data compression even when not explicitly instructed, which has been exploited by the researchers for the GPU.zip attack.

According to the researchers, the GPU.zip attack can steal usernames from a Wikipedia iframe in less than 215 minutes on Intel GPUs with an accuracy of 98.3%.

The lack of response from impacted vendors and the ubiquity of the vulnerable graphics cards imply a high potential risk, but the complexity and time requirement for the attack moderate the immediate threat to users.

The researchers also note that the attack will not work on browsers like Firefox and Safari that do not meet the specific criteria for exploitation.