GPUs from all major suppliers are vulnerable to new pixel-stealing attack::A previously unknown compression side channel in GPUs can expose images thought to be private.

  • AutoTL;DRB
    link
    fedilink
    English
    01 year ago

    This is the best summary I could come up with:


    The researchers found that data compression that both internal and discrete GPUs use to improve performance acts as a side channel that they can abuse to bypass the restriction and steal pixels one by one.

    “We found that modern GPUs automatically try to compress this visual data, without any application involvement,” Yingchen Wang, the lead author and a researcher at the University of Texas at Austin, wrote in an email.

    Most websites restrict the cross-origin embedding of pages displaying user names, passwords, or other sensitive content through X-Frame-Options or Content-Security-Policy headers.

    All of the GPUs analyzed use proprietary forms of compression to optimize the bandwidth available in the memory data bus of the PC, phone, or other device displaying the targeted content.

    The insights yielded a method that uses the SVG, or the scalable vector graphics image format, to maximize differences in DRAM traffic between black and white target pixels in the presence of compression.

    Our proof-of-concept attack succeeds on a range of devices (including computers, phones) from a variety of hardware vendors with distinct GPU architectures (Intel, AMD, Apple, Nvidia).


    The original article contains 832 words, the summary contains 181 words. Saved 78%. I’m a bot and I’m open source!

    • @db2@sopuli.xyz
      link
      fedilink
      English
      11 year ago

      And it left out possibly the most important piece of information:

      For GPU.zip to work, a malicious page must be loaded into the Chrome or Edge browsers. Under-the-hood differences in the way Firefox and Safari work prevent the attack from succeeding when those browsers process an attack page.