-
There is a new vulnerability called LeftoverLocals (CVE-2023-4969): A detailed description can be found here: and a German sum-up is available on https://www.golem.de/news/apple-amd-qualcomm-gpus-mehrerer-hersteller-anfaellig-fuer-datenklau-2401-181263.html => will constellation be able to protect against attacks like this
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
Hello, thank you for submitting this question. The attack setup for LeftoverLocals requires an attacker to launch workloads on the same physical device that the victim is running workloads on. In a traditional cloud deployment (no CC) there are two scenarios where this could arrise: (a) The attacker controls the hypervisor. The attacker could temporarily remount the device to a different VM or send commands to the GPU directly. This would allow them to execute malicous kernels. Confidential computing, and with that Constellation, would protect you against scenario (a). However, this is only the case if the GPU also supports confidential computing features. The central point being that CPU and GPU establish an encrypted channel before workloads are started. To our knowledge this is currently only the case for Nvidia's H100 [2]. Scenario (b) needs two exploitable vulnerabilities in order to cause harm, even without CC. One exploit for a vulnerability in the virtualization technology (e.g. Nvidia MIG). Another one for LeftoverLocals. To summarize: the architecture of Constellation adds an additional layer of protection to the most likely attack scenarios, once it has H100 support. Which will come as soon as hardware is available. Please let us know if you have more specific attack scenarios that you would like to discuss. CPU-only inference/training is already possible on C11n. And would not be affected by something like LeftoverLocals. [1] https://docs.nvidia.com/datacenter/tesla/mig-user-guide/index.html |
Beta Was this translation helpful? Give feedback.
Hello,
thank you for submitting this question.
As you have already pointed out, this is a hypothetical answer atm since Constellation does not support GPUs/NPUs, yet.
The attack setup for LeftoverLocals requires an attacker to launch workloads on the same physical device that the victim is running workloads on. In a traditional cloud deployment (no CC) there are two scenarios where this could arrise:
(a) The attacker controls the hypervisor. The attacker could temporarily remount the device to a different VM or send commands to the GPU directly. This would allow them to execute malicous kernels.
(b) The GPU attached to the VM is virtualized with a technology like Nvidia MIG [1].
Confident…