Grand Pwning Unit: Accelerating microarchitectural attacks with the GPU
Grand Pwning Unit: Accelerating microarchitectural attacks with the GPU Frigo et al., IEEE Security & Privacy
The general awareness of microarchitectural attacks is greatly increased since meltdown and spectre earlier this year. A lot of time and energy has been spent in defending against such attacks, with a threat model that assumes attacks originate from the CPU. Frigo et al. open up an entirely new can of worms – modern SoCs contain a variety of special purpose accelerator units, chief among which is the GPU. GPUs are everywhere these days.
Unfortunately, the inclusion of these special-purpose units in the processor today appears to be guided by a basic security model that mainly governs access control, while entirely ignoring the threat of more advanced microarchitectural attacks.
I’m sure you know where this is heading…
It turns out the accelerators can also be used to “accelerate” microarchitectural attacks. Once more we find ourselves in a situation with widespread vulnerabilities. The demonstration target in the paper is a mobile phone running on the ARM platform, with all known defences, including any applicable advanced research defences, employed. Using WebGL from JavaScript, Frigo et al. show how to go from e.g. an advert Continue reading

Security Log Monitoring is a SaaS-based log collection and security information and event management (SIEM) platform built on open source and proprietary tools.
Empirix’s service assurance platform and analytics monitoring software underwent interoperability testing with Huawei's evolved packet core, and passed.
Cisco recently said its partnership with Ericsson was languishing. But its relationship with Samsung is moving full-steam ahead.
Recent surveys show surging use of serverless platforms and the potential for performance benefits. But deployment challenges could open the door for Kubernetes to act as an orchestrating element.
A complete buyout of VMware by Dell Technologies would have likely sparked an employee and shareholder revolt. But that option may still be on the table.
If IT and operations teams thought it was hard to contend with BYOD and Shadow IT, they must prepare for the latest siege on IT — the Internet of Things.