this post was submitted on 28 Sep 2023
74 points (94.0% liked)

Technology

59374 readers
3169 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

GPUs from all major suppliers are vulnerable to new pixel-stealing attack::A previously unknown compression side channel in GPUs can expose images thought to be private.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 1 year ago (1 children)

This is the best summary I could come up with:


The researchers found that data compression that both internal and discrete GPUs use to improve performance acts as a side channel that they can abuse to bypass the restriction and steal pixels one by one.

“We found that modern GPUs automatically try to compress this visual data, without any application involvement,” Yingchen Wang, the lead author and a researcher at the University of Texas at Austin, wrote in an email.

Most websites restrict the cross-origin embedding of pages displaying user names, passwords, or other sensitive content through X-Frame-Options or Content-Security-Policy headers.

All of the GPUs analyzed use proprietary forms of compression to optimize the bandwidth available in the memory data bus of the PC, phone, or other device displaying the targeted content.

The insights yielded a method that uses the SVG, or the scalable vector graphics image format, to maximize differences in DRAM traffic between black and white target pixels in the presence of compression.

Our proof-of-concept attack succeeds on a range of devices (including computers, phones) from a variety of hardware vendors with distinct GPU architectures (Intel, AMD, Apple, Nvidia).


The original article contains 832 words, the summary contains 181 words. Saved 78%. I'm a bot and I'm open source!

[–] [email protected] 33 points 1 year ago (1 children)

And it left out possibly the most important piece of information:

For GPU.zip to work, a malicious page must be loaded into the Chrome or Edge browsers. Under-the-hood differences in the way Firefox and Safari work prevent the attack from succeeding when those browsers process an attack page.

[–] [email protected] 8 points 1 year ago (2 children)

Once again, this is another example of how poor these TLDR bots are. I asked a popular LLM (which people here love to hate) to summarize the article, and not only did I get an actual TLDR (< 150 words), it also included the most important piece of information:

GPUs from major suppliers including Apple, Intel, AMD, Qualcomm, Arm, and Nvidia are vulnerable to an attack allowing malicious websites to read sensitive visual data from other websites. The exploit, named GPU.zip, violates the "same origin policy", a fundamental internet security boundary. The vulnerability starts when a malicious site places a link in an iframe, an HTML element. While normally this policy prevents content interaction between sites, the data compression used by GPUs for performance optimization creates a side channel that can be exploited. To succeed, the attack requires loading a malicious page in Chrome or Edge; Firefox and Safari's operational differences protect them. Furthermore, the targeted page in the iframe should allow cross-origin embedding. Although many sites block this embedding using X-Frame-Options or Content-Security-Policy headers, some, like Wikipedia, don't. The current risk posed by GPU.zip is considered low, but the discovery emphasizes potential hardware-based side channels in security.

[–] [email protected] 9 points 1 year ago* (last edited 1 year ago)

It's because many TLDR bots are using relatively basic algorithms to summarize versus incredibly complex language models that have been trained on billions of data points. No rational person would disagree with you that ChatGPT/LLaMA/etc are vastly more sophisticated and often more effective than a common bot.

[–] [email protected] 1 points 1 year ago

I've been toying with the idea of making a bot similar to autotldr, but using an llm to summarize the data for some time now.