Initial implementation for paper: Eavesdropping user credentials via GPU side channels on smartphones (ASPLOS'22)
This code repository stores initial program implementation for paper submission Eavesdropping User Credentials via GPU Side Channels on Smartphones , which is later accepted into the 27th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'22).
For official source code artifacts that published with the paper, please visit our Zenodo repository.
offline
: provides source code for offline training system.online
: provides a demo Android App project. The demo App may perform attack to infer user input.gamedemo
: provides Unity-based game demo projects for runtime optimization demonstration.
For more description on each part, please refer to the paper and README files in each directory.
The source code published here are only suitable for the Android OS version at the time of paper publishing. It requires devices with Qualcomm GPU, the same Android OS version (Android 11) without recent Android security updates. Since the CVE involved (CVE-2022-22075) is mitigated in Feb 2023 Android security update, any newer Android system will not be able to utilize source code published here.
For details, please refer to our paper for more information.
@inproceedings{yang2022eavesdropping,
title={Eavesdropping user credentials via GPU side channels on smartphones},
author={Yang, Boyuan and Chen, Ruirong and Huang, Kai and Yang, Jun and Gao, Wei},
booktitle={Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems},
pages={285--299},
year={2022}
}