this post was submitted on 26 Sep 2023
10 points (85.7% liked)

Security

5010 readers
1 users here now

Confidentiality Integrity Availability

founded 4 years ago
MODERATORS
top 3 comments
sorted by: hot top controversial new old
[–] MossyFeathers@pawb.social 8 points 1 year ago* (last edited 1 year ago)

Remember to regularly count your pixels guys. You wouldn't want to find yourself missing a handful during an important gaming tournament.

[–] ZenFriedRice@lemmy.ml 6 points 1 year ago

Interesting article. Looks it isn't a huge threat. It takes a long time to carry out, and only works on crome/edge.

[–] autotldr@lemmings.world 1 points 1 year ago

This is the best summary I could come up with:


The researchers found that data compression that both internal and discrete GPUs use to improve performance acts as a side channel that they can abuse to bypass the restriction and steal pixels one by one.

“We found that modern GPUs automatically try to compress this visual data, without any application involvement,” Yingchen Wang, the lead author and a researcher at the University of Texas at Austin, wrote in an email.

Most websites restrict the cross-origin embedding of pages displaying user names, passwords, or other sensitive content through X-Frame-Options or Content-Security-Policy headers.

All of the GPUs analyzed use proprietary forms of compression to optimize the bandwidth available in the memory data bus of the PC, phone, or other device displaying the targeted content.

The insights yielded a method that uses the SVG, or the scalable vector graphics image format, to maximize differences in DRAM traffic between black and white target pixels in the presence of compression.

Our proof-of-concept attack succeeds on a range of devices (including computers, phones) from a variety of hardware vendors with distinct GPU architectures (Intel, AMD, Apple, Nvidia).


The original article contains 832 words, the summary contains 181 words. Saved 78%. I'm a bot and I'm open source!