Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Graphics The Internet Hardware Technology

Graphics Cards: the Future of Online Authentication? 178

Gunkerty Jeb writes "Researchers working on the 'physically unclonable functions found in standard PC components (PUFFIN) project' announced last week that widely used graphics processors could be the next step in online authentication. The project seeks to find uniquely identifiable characteristics of hardware in common computers, mobile devices, laptops and consumer electronics. The researchers realized that apparently identical graphics processors are actually different in subtle, unforgeable ways. A piece of software developed by the researchers is capable of discerning these fine differences. The order of magnitude of these differences is so minute, in fact, that manufacturing equipment is incapable of manipulating or replicating them. Thus, the fine-grained manufacturing differences can act as a sort of a key to reliably distinguish each of the processors from one another. The implication of this discovery is that such differences can be used as physically unclonable features to securely link the graphics cards, and by extension, the computers in which they reside and the persons using them, to specific online accounts."
This discussion has been archived. No new comments can be posted.

Graphics Cards: the Future of Online Authentication?

Comments Filter:
  • Re:Why not RTFA? (Score:4, Informative)

    by Anonymous Coward on Tuesday October 02, 2012 @05:15PM (#41531049)

    You can feed false information to the software that reads the characteristics of a graphics card just as you can fake an MAC address. I fail to see a substantial difference.

    "The more difficult question to answer at this point, she said, is whether someone could use software to emulate the differences in behavior between graphical processing units. Lange said the key is finding a way to guarantee, in an authentication process, that the party attempting to authenticate a user is communicating with an actual GPU and not software attempting to replicate its behavior and uniqueness. Lange went on to admit they aren’t quite there yet, which is why the product is not finished."

  • by NevarMore ( 248971 ) on Tuesday October 02, 2012 @05:18PM (#41531089) Homepage Journal

    Not entirely true. Good security is based on 3 things:
      - something only you have (your graphics card, a physical key)
      - something only you know (a password)
      - something only you are (biometrics, typing patterns)

    As it stands today you usually have one of those things, the password. Adding in something difficult to spoof as the summary suggests is an improvement. So now you have to have a password and a graphics card with certain flaws.

    I agree with your sentiments though. This is an interesting idea but seems awkward to implement.

  • by tepples ( 727027 ) <tepples.gmail@com> on Tuesday October 02, 2012 @05:43PM (#41531383) Homepage Journal
    Anonymous Coward wrote:

    Yes, in some cases multiple people share a device, but that percentage is low enough it won't matter.

    Let me guess: you live alone. In a lot of households, especially with two parents and one or more children, everybody who lives there has a user account on one PC.

  • by slew ( 2918 ) on Tuesday October 02, 2012 @06:26PM (#41531817)

    FWIW: If you read WP2 & WP3, I think they are just attempting to read some of the SRAM from inside the GPU for a source of what they call a "PUF" (physically uncloneable function). They hope to sprinkle some error-correction code and some magic crypto dust the uninitialized SRAM pattern to create a number that will be useable for attestation (basically to assure that it is the machine that you think it is).

    This idea isn't new. A quick google search shows papers about using SRAMs as both PUFs and Random numbers going back in 2007 (they called them FERNs) http://people.cs.umass.edu/~kevinfu/papers/holcomb-FERNS-RFIDSec07.pdf [umass.edu]

    The major problems with this stuff is that...

    Once you power up your system, something is gonna want to use that SRAM (GPU vendors aren't in the business of leaving big chunks of SRAM that they don't use for researchers to discover and use), so you have to take a snapshot after powerup, but before someone wants to use the GPU. This makes many avenues of attack available (e.g., you have to put that fingerprint somewhere, because the GPUs will shortly trounce all over it).

    Secondly is the stability issue. Although some parts of the uninitialized SRAM is going to be statistically stable (power-up to 1 or 0 pretty reliably), some others are going to be pretty random (in fact other researchers are looking for highly unstable bits in SRAM powerup to be able to extract a random number for a nonce). Across temperature, and over time as the parts age, these bits will change (some stable ones will become random and some random ones may exhibit a strong bias one way or another). Without extensive characterization over age and temperature, this would be pretty unstable to use as a definitive ID.

    Third, when GPU vendors notice that people are accessing SRAM before initalization, they will start wiping the memory on boot. This is to prevent this third-party ID usage model (because nobody wants to repeat the intel CPUID fiasco) and because now that GPUs are being used for general-purpose computing, any type of SRAM retention issues across power-up is a security risk. On a related note, there are in fact there are other researchers attempting to use SRAM retention to create a reasonably secure clock (google TARDIS: Time and Remanence Decay in SRAM).

    If I had to speculate, about the only reasonable model for this (assuming the GPU vendors don't co-opt it or shut them out) is to create some sort of "ticket" system. Distill a timestamp and a challenge value with the PUF (and maybe even the "random" part of the SRAM for salt) down to a ticket using some cryptomagic. That ticket would be valid for a while, and you'd have to create a new ticket before it expired. Over a short enough time and temperature regime, a security system might be convinced that this temporary ticket is an acceptable substitute credential, but it would not really replace an actual authentication technique.

    This stuff has also been researched extensively for 5 years or so. I don't know what these folks are really bringing to the table (other than they are looking at GPUs for big blocks of SRAM). Why be so secret? Maybe it's because they want to keep that funding coming. A quick google showed someone in 2009 even wrote an undergrad paper on the subject of SRAM/PUFs... http://www.wpi.edu/Pubs/E-project/Available/E-project-031709-141338/unrestricted/mqp_sram.pdf [wpi.edu]

  • by Sebastopol ( 189276 ) on Tuesday October 02, 2012 @09:00PM (#41533049) Homepage

    The actual website indicates it hasn't even been done yet, and is lighter on details than white bread.

    It is complete BS, the website has no details and tons of press releases. Here is how much work they have done so far, about a dozen lines of text:

    http://puffin.eu.org/WP1.html [eu.org]
    http://puffin.eu.org/WP2.html [eu.org]
    http://puffin.eu.org/WP3.html [eu.org]

    I think they posted the release in hopes of letting the online community discuss ideas, and will then harvest those.

    Lame.

Without life, Biology itself would be impossible.

Working...