{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:40Z","timestamp":1772906380599,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["101076409"],"award-info":[{"award-number":["101076409"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002428","name":"Austrian Science Fund","doi-asserted-by":"publisher","award":["I6054"],"award-info":[{"award-number":["I6054"]}],"id":[{"id":"10.13039\/501100002428","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3656283","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"128-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Generic and Automated Drive-by GPU Cache Attacks from the Browser"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7133-1515","authenticated-orcid":false,"given":"Lukas","family":"Giner","sequence":"first","affiliation":[{"name":"IAIK, Graz University of Technology, Graz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9230-0833","authenticated-orcid":false,"given":"Roland","family":"Czerny","sequence":"additional","affiliation":[{"name":"IAIK, Graz University of Technology, Graz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2037-6651","authenticated-orcid":false,"given":"Christoph","family":"Gruber","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7286-1156","authenticated-orcid":false,"given":"Fabian","family":"Rauscher","sequence":"additional","affiliation":[{"name":"IAIK, Graz University of Technology, Graz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7314-9033","authenticated-orcid":false,"given":"Andreas","family":"Kogler","sequence":"additional","affiliation":[{"name":"IAIK, Graz University of Technology, Graz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5083-5434","authenticated-orcid":false,"given":"Daniel De Almeida","family":"Braga","sequence":"additional","affiliation":[{"name":"IRISA, University of Rennes, CNRS, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7977-3246","authenticated-orcid":false,"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[{"name":"IAIK, Graz University of Technology, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NVIDIA \"CUDA C++ Programming Guide \" 2023."},{"key":"e_1_3_2_1_2_1","unstructured":"Khronos \"OpenCL \" 2023. [Online]. Available: https:\/\/www.khronos.org\/opencl\/"},{"key":"e_1_3_2_1_3_1","volume-title":"Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel,\" in DSN","author":"Wei J.","year":"2020","unstructured":"J. Wei, Y. Zhang, Z. Zhou, Z. Li, and M. A. A. Faruque, \"Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel,\" in DSN, 2020."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/ACCESS.2021.3077551","article-title":"Optimization of advanced encryption standard on graphics processing units","volume":"9","author":"Tezcan C.","year":"2021","unstructured":"C. Tezcan, \"Optimization of advanced encryption standard on graphics processing units,\" IEEE Access, vol. 9, pp. 67 315--67 326, 2021.","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_5_1","unstructured":"T. Yamanouchi \"GPU Gems 3 - AES Encryption and Decryption on the GPU \" 2007. [Online]. Available: https:\/\/developer.nvidia.com\/gpugems\/gpugems3\/part-vi-gpu-computing\/chapter-36-aes-encryption-and-decryption-gpu"},{"key":"e_1_3_2_1_6_1","volume-title":"Trident: A hybrid correlation-collision GPU cache timing attack for AES key recovery,\" in HPCA","author":"Ahn J.","year":"2021","unstructured":"J. Ahn, C. Jin, J. Kim, M. Rhu, Y. Fei, D. Kaeli, and J. Kim, \"Trident: A hybrid correlation-collision GPU cache timing attack for AES key recovery,\" in HPCA, 2021."},{"key":"e_1_3_2_1_7_1","volume-title":"A complete key recovery timing attack on a GPU,\" in HPCA","author":"Jiang Z. H.","year":"2016","unstructured":"Z. H. Jiang, Y. Fei, and D. Kaeli, \"A complete key recovery timing attack on a GPU,\" in HPCA, 2016."},{"key":"e_1_3_2_1_8_1","first-page":"167","article-title":"A novel side-channel timing attack on GPUs","author":"Jiang Z. H.","year":"2017","unstructured":"Z. H. Jiang, Y. Fei, and D. Kaeli, \"A novel side-channel timing attack on GPUs,\" in Proceedings of the on Great Lakes Symposium on VLSI, 2017, pp. 167--172.","journal-title":"Proceedings of the on Great Lakes Symposium on VLSI"},{"key":"e_1_3_2_1_9_1","volume-title":"Exploiting bank conflict-based side-channel timing leakage of gpus,\" ACM TACO","author":"Jiang Z. H.","year":"2019","unstructured":"Z. H. Jiang, Y. Fei, and D. Kaeli, \"Exploiting bank conflict-based side-channel timing leakage of gpus,\" ACM TACO, 2019."},{"key":"e_1_3_2_1_10_1","volume-title":"Constructing and characterizing covert channels on GPGPUs,\" in MICRO","author":"Naghibijouybari H.","year":"2017","unstructured":"H. Naghibijouybari, K. N. Khasawneh, and N. B. Abu-Ghazaleh, \"Constructing and characterizing covert channels on GPGPUs,\" in MICRO, 2017."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544102"},{"key":"e_1_3_2_1_12_1","volume-title":"Rendered Insecure: GPU Side Channel Attacks are Practical,\" in CCS","author":"Naghibijouybari H.","year":"2018","unstructured":"H. Naghibijouybari, A. Neupane, Z. Qian, and N. Abu-Ghazaleh, \"Rendered Insecure: GPU Side Channel Attacks are Practical,\" in CCS, 2018."},{"key":"e_1_3_2_1_13_1","volume-title":"Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU,\" in S&P","author":"Frigo P.","year":"2018","unstructured":"P. Frigo, C. Giuffrida, H. Bos, and K. Razavi, \"Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU,\" in S&P, 2018."},{"key":"e_1_3_2_1_14_1","volume-title":"SGAxe: How SGX fails in practice","author":"van Schaik S.","year":"2020","unstructured":"S. van Schaik, A. Kwong, D. Genkin, and Y. Yarom, \"SGAxe: How SGX fails in practice,\" 2020."},{"key":"e_1_3_2_1_15_1","volume-title":"An Exploration of ARM System-Level Cache and GPU Side Channels,\" in ACSAC","author":"Cronin P.","year":"2021","unstructured":"P. Cronin, X. Gao, H. Wang, and C. Cotton, \"An Exploration of ARM System-Level Cache and GPU Side Channels,\" in ACSAC, 2021."},{"key":"e_1_3_2_1_16_1","volume-title":"Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems,\" in ISCA","author":"Dutta S. B.","year":"2022","unstructured":"S. B. Dutta, H. Naghibijouybari, A. Gupta, N. B. Abu-Ghazaleh, A. Marquez, and K. J. Barker, \"Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems,\" in ISCA, 2022."},{"key":"e_1_3_2_1_17_1","unstructured":"W3C \"WebGPU - W3C Working Draft - Timing attacks \" 2023. [Online]. Available: https:\/\/www.w3.org\/TR\/webgpu\/#security-timing"},{"key":"e_1_3_2_1_18_1","volume-title":"ASLR on the Line: Practical Cache Attacks on the MMU.\" in NDSS","author":"Gras B.","year":"2017","unstructured":"B. Gras, K. Razavi, E. Bosman, H. Bos, and C. Giuffrida, \"ASLR on the Line: Practical Cache Attacks on the MMU.\" in NDSS, 2017."},{"key":"e_1_3_2_1_19_1","volume-title":"Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript,\" in FC","author":"Schwarz M.","year":"2017","unstructured":"M. Schwarz, C. Maurice, D. Gruss, and S. Mangard, \"Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript,\" in FC, 2017."},{"key":"e_1_3_2_1_20_1","unstructured":"A. van Kesteren \"Safely reviving shared memory \" 2020. [Online]. Available: https:\/\/hacks.mozilla.org\/2020\/07\/safely-reviving-shared-memory\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Mozilla \"SharedArrayBuffer \" 2012. [Online]. Available: https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/SharedArrayBuffer"},{"key":"e_1_3_2_1_22_1","unstructured":"W3C \"WebGPU Security Considerations \" 2023. [Online]. Available: https:\/\/www.w3.org\/TR\/webgpu\/#security-considerations"},{"key":"e_1_3_2_1_23_1","unstructured":"NVIDIA \"NVIDIA Tesla v100 GPU architecture \" 2017. [Online]. Available: https:\/\/images.nvidia.com\/content\/volta-architecture\/pdf\/volta-architecture-whitepaper.pdf"},{"key":"e_1_3_2_1_24_1","unstructured":"NVIDIA \"Kernel Profiling Guide \" 2023."},{"key":"e_1_3_2_1_25_1","unstructured":"AMD \"AMD RDNA Whitepaper \" 2023. [Online]. Available: https:\/\/www.amd.com\/system\/files\/documents\/rdna-whitepaper.pdf"},{"key":"e_1_3_2_1_26_1","unstructured":"K. Group \"WebGL Specification \" https:\/\/registry.khronos.org\/webgl\/specs\/1.0.3\/ 2023."},{"key":"e_1_3_2_1_27_1","unstructured":"K. W. W. Group \"WebGL 2.0 Compute \" https:\/\/registry.khronos.org\/webgl\/specs\/latest\/2.0-compute\/ 2021."},{"key":"e_1_3_2_1_28_1","unstructured":"Mozilla \"WebGPU API \" 2023. [Online]. Available: https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/WebGPU_API"},{"key":"e_1_3_2_1_29_1","unstructured":"Google \"Chrome ships WebGPU \" 2023. [Online]. Available: https:\/\/developer.chrome.com\/blog\/webgpu-release\/"},{"key":"e_1_3_2_1_30_1","unstructured":"W3C \"WebGPU \" 2023. [Online]. Available: https:\/\/www.w3.org\/TR\/webgpu"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_32_1","volume-title":"Cache Attacks and Countermeasures: the Case of AES,\" in CT-RSA","author":"Osvik D. A.","year":"2006","unstructured":"D. A. Osvik, A. Shamir, and E. Tromer, \"Cache Attacks and Countermeasures: the Case of AES,\" in CT-RSA, 2006."},{"key":"e_1_3_2_1_33_1","volume-title":"The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications,\" in CCS","author":"Oren Y.","year":"2015","unstructured":"Y. Oren, V. P. Kemerlis, S. Sethumadhavan, and A. D. Keromytis, \"The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications,\" in CCS, 2015."},{"key":"e_1_3_2_1_34_1","volume-title":"JavaScript 0: Overcoming browser-based side-channel defenses,\" in USENIX Security","author":"Shusterman A.","year":"2021","unstructured":"A. Shusterman, A. Agarwal, S. O'Connell, D. Genkin, Y. Oren, and Y. Yarom, \"Prime+Probe 1, JavaScript 0: Overcoming browser-based side-channel defenses,\" in USENIX Security, 2021."},{"key":"e_1_3_2_1_35_1","volume-title":"Rendering Contention Channel Made Practical in Web Browsers,\" in USENIX Security","author":"Wu S.","year":"2022","unstructured":"S. Wu, J. Yu, M. Yang, and Y. Cao, \"Rendering Contention Channel Made Practical in Web Browsers,\" in USENIX Security, 2022."},{"key":"e_1_3_2_1_36_1","volume-title":"Leaky buddies: Cross-component covert channels on integrated cpu-gpu systems,\" in ISCA","author":"Dutta S. B.","year":"2021","unstructured":"S. B. Dutta, H. Naghibijouybari, N. Abu-Ghazaleh, A. Marquez, and K. Barker, \"Leaky buddies: Cross-component covert channels on integrated cpu-gpu systems,\" in ISCA, 2021."},{"key":"e_1_3_2_1_37_1","volume-title":"Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs,\" in USENIX Security","author":"Taneja H.","year":"2023","unstructured":"H. Taneja, J. Kim, J. J. Xu, S. van Schaik, D. Genkin, and Y. Yarom, \"Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs,\" in USENIX Security, 2023."},{"key":"e_1_3_2_1_38_1","volume-title":"Theory and Practice of Finding Eviction Sets,\" in S&P","author":"Vila P.","year":"2019","unstructured":"P. Vila, B. K\u00f6pf, and J. Morales, \"Theory and Practice of Finding Eviction Sets,\" in S&P, 2019."},{"key":"e_1_3_2_1_39_1","volume-title":"ARMageddon: Cache Attacks on Mobile Devices,\" in USENIX Security","author":"Lipp M.","year":"2016","unstructured":"M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard, \"ARMageddon: Cache Attacks on Mobile Devices,\" in USENIX Security, 2016."},{"key":"e_1_3_2_1_40_1","unstructured":"W3C \"WebGPU Shading Language - Terminology and Concepts \" 2023. [Online]. Available: https:\/\/www.w3.org\/TR\/WGSL\/#uniformity-concepts"},{"key":"e_1_3_2_1_41_1","volume-title":"Fractional GPUs: Software-based compute and memory bandwidth reservation for GPUs,\" in IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)","author":"Jain S.","year":"2019","unstructured":"S. Jain, I. Baek, S. Wang, and R. Rajkumar, \"Fractional GPUs: Software-based compute and memory bandwidth reservation for GPUs,\" in IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2019."},{"key":"e_1_3_2_1_42_1","volume-title":"Reverse Engineering Intel Complex Addressing Using Performance Counters,\" in RAID","author":"Maurice C.","year":"2015","unstructured":"C. Maurice, N. Le Scouarnec, C. Neumann, O. Heen, and A. Francillon, \"Reverse Engineering Intel Complex Addressing Using Performance Counters,\" in RAID, 2015."},{"key":"e_1_3_2_1_43_1","volume-title":"Systematic reverse engineering of cache slice selection in Intel processors,\" in Euromicro Conference on Digital System Design","author":"Irazoqui G.","year":"2015","unstructured":"G. Irazoqui, T. Eisenbarth, and B. Sunar, \"Systematic reverse engineering of cache slice selection in Intel processors,\" in Euromicro Conference on Digital System Design, 2015."},{"issue":"1","key":"e_1_3_2_1_45_1","article-title":"Dissecting GPU memory hierarchy through microbench-marking","volume":"28","author":"Mei X.","year":"2016","unstructured":"X. Mei and X. Chu, \"Dissecting GPU memory hierarchy through microbench-marking,\" IEEE Transactions on Parallel and Distributed Systems, vol. 28, no. 1, 2016.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_1_46_1","volume-title":"Dissecting the NVidia Turing T4 GPU via microbenchmarking,\" arXiv:1903.07486","author":"Jia Z.","year":"2019","unstructured":"Z. Jia, M. Maggioni, J. Smith, and D. P. Scarpazza, \"Dissecting the NVidia Turing T4 GPU via microbenchmarking,\" arXiv:1903.07486, 2019."},{"key":"e_1_3_2_1_47_1","volume-title":"Dissecting the NVIDIA volta GPU architecture via microbenchmarking,\" arXiv:1804.06826","author":"Jia Z.","year":"2018","unstructured":"Z. Jia, M. Maggioni, B. Staiger, and D. P. Scarpazza, \"Dissecting the NVIDIA volta GPU architecture via microbenchmarking,\" arXiv:1804.06826, 2018."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"M. K. Qureshi \"New attacks and defense for encrypted-address cache \" in ISCA 2019.","DOI":"10.1145\/3307650.3322246"},{"key":"e_1_3_2_1_49_1","volume-title":"Systematic Analysis of Randomization-based Protected Cache Architectures,\" in S&P","author":"Purnal A.","year":"2021","unstructured":"A. Purnal, L. Giner, D. Gruss, and I. Verbauwhede, \"Systematic Analysis of Randomization-based Protected Cache Architectures,\" in S&P, 2021."},{"key":"e_1_3_2_1_50_1","volume-title":"Timing Analysis of Keystrokes and Timing Attacks on SSH,\" in USENIX Security","author":"Song D. X.","year":"2001","unstructured":"D. X. Song, D. Wagner, and X. Tian, \"Timing Analysis of Keystrokes and Timing Attacks on SSH,\" in USENIX Security, 2001."},{"key":"e_1_3_2_1_51_1","volume-title":"Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches,\" in USENIX Security","author":"Gruss D.","year":"2015","unstructured":"D. Gruss, R. Spreitzer, and S. Mangard, \"Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches,\" in USENIX Security, 2015."},{"key":"e_1_3_2_1_52_1","volume-title":"Practical Keystroke Timing Attacks in Sandboxed JavaScript,\" in ESORICS","author":"Lipp M.","year":"2017","unstructured":"M. Lipp, D. Gruss, M. Schwarz, D. Bidner, C.-m.-t.-n. Maurice, and S. Mangard, \"Practical Keystroke Timing Attacks in Sandboxed JavaScript,\" in ESORICS, 2017."},{"key":"e_1_3_2_1_53_1","volume-title":"Keylogging Side Channels,\" in S&P","author":"Monaco J.","year":"2018","unstructured":"J. Monaco, \"SoK: Keylogging Side Channels,\" in S&P, 2018."},{"key":"e_1_3_2_1_54_1","volume-title":"Cache-collision timing attacks against AES,\" in CHES","author":"Bonneau J.","year":"2006","unstructured":"J. Bonneau and I. Mironov, \"Cache-collision timing attacks against AES,\" in CHES, 2006."},{"key":"e_1_3_2_1_55_1","volume-title":"Cross-VM attack on AES,\" in RAID","author":"Irazoqui G.","year":"2014","unstructured":"G. Irazoqui, M. S. Inci, T. Eisenbarth, and B. Sunar, \"Wait a minute! A fast, Cross-VM attack on AES,\" in RAID, 2014."},{"key":"e_1_3_2_1_56_1","volume-title":"Springer","author":"Neve M.","year":"2007","unstructured":"M. Neve and J.-P. Seifert, \"Advances on access-driven cache attacks on AES,\" in SAC. Springer, 2007."},{"key":"e_1_3_2_1_57_1","volume-title":"Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud,\" in NDSS","author":"Maurice C.","year":"2017","unstructured":"C. Maurice, M. Weber, M. Schwarz, L. Giner, D. Gruss, C. Alberto Boano, S. Mangard, and K. R\u00f6mer, \"Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud,\" in NDSS, 2017."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3656283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":56,"alternative-id":["10.1145\/3634737.3656283","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3656283","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}