PixelVault: Using GPUs for Securing Cryptographic Operations

被引:37
|
作者
Vasiliadis, Giorgos [1 ]
Athanasopoulos, Elias [1 ]
Polychronakis, Michalis [2 ]
Ioannidis, Sotiris [1 ]
机构
[1] FORTH ICS, Iraklion, Greece
[2] Columbia Univ, New York, NY 10027 USA
关键词
GPU; SSL/TLS; trusted execution; isolation; tamper resistance;
D O I
10.1145/2660267.2660316
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper we present PixelVault, a system for keeping cryptographic keys and carrying out cryptographic operations exclusively on the GPU, which allows it to protect secret keys from leakage even in the event of full system compromise. This is possible by exposing secret keys only in GPU registers, keeping PixelVault's critical code in the GPU instruction cache, and preventing any access to both of them from the host. Due to the non-preemptive execution mode of the GPU, an adversary that has full control of the host cannot tamper with Pixel Vault's GPU code, but only terminate it, in which case all sensitive data is lost. We have implemented a PixelVault-enabled version of the OpenSSL library that allows the protection of existing applications with minimal modifications. Based on the results of our evaluation, PixelVault not only provides secure key storage using commodity hardware, but also significantly speeds up the processing throughput of cryptographic operations for server applications.
引用
收藏
页码:1131 / 1142
页数:12
相关论文
共 50 条
  • [1] Calculating the cryptographic currencies using GPUs
    Sedmak, Luka
    Dobravec, Tomaz
    [J]. ELEKTROTEHNISKI VESTNIK-ELECTROCHEMICAL REVIEW, 2015, 82 (1-2): : 1 - 7
  • [2] Securing edge computing using cryptographic schemes: a review
    Mahato, Ganesh Kumar
    Chakraborty, Swarnendu Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (12) : 34825 - 34848
  • [3] Securing edge computing using cryptographic schemes: a review
    Ganesh Kumar Mahato
    Swarnendu Kumar Chakraborty
    [J]. Multimedia Tools and Applications, 2024, 83 : 34825 - 34848
  • [4] Parallel Implementation of Cryptographic Algorithm: AES Using OpenCL on GPUs
    Inampudi, Govardhana Rao
    Shyamala, K.
    Ramachandram, S.
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 984 - 988
  • [5] Compiling and securing cryptographic protocols
    Chevalier, Yannick
    Rusinowitch, Michael
    [J]. INFORMATION PROCESSING LETTERS, 2010, 110 (03) : 116 - 122
  • [6] Securing Visual Cryptographic Shares using Public Key Encryption
    Kaur, Kulvinder
    Khemchandani, Vineeta
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1108 - 1113
  • [7] Securing recognized multimodal biometric images using cryptographic model
    Evangelin, L. Nisha
    Fred, A. Lenin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (12) : 18735 - 18752
  • [8] Securing recognized multimodal biometric images using cryptographic model
    L. Nisha Evangelin
    A. Lenin Fred
    [J]. Multimedia Tools and Applications, 2021, 80 : 18735 - 18752
  • [9] Optimizing convolution operations on GPUs using adaptive tiling
    van Werkhovena, Ben
    Maassen, Jason
    Bal, Henri E.
    Seinstra, Frank J.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 14 - 26
  • [10] Cryptographic Methods for Securing the YML Framework
    Lv, Xin
    Petiton, Serge G.
    Shang, Ling
    Wang, Zhijian
    Xu, Feng
    [J]. 2012 1ST INTERNATIONAL CONFERENCE ON SYSTEMS AND COMPUTER SCIENCE (ICSCS), 2012,