GPU Side Channel Attack Bypasses Browser Security to Steal Sensitive Visual Data
-
SAME ORIGIN POLICY SHATTERED - A newly discovered GPU compression side channel allows malicious websites to read sensitive visual data from other websites.
-
The attack works by abusing GPU compression schemes that optimize bandwidth, creating a side channel to bypass the same origin policy.
-
Proof-of-concept attack succeeds in stealing pixels to reveal usernames on sites like Wikipedia in browsers like Chrome and Edge.
-
Attack works on Apple, Intel, AMD, Qualcomm, Arm, and Nvidia GPUs by reverse-engineering their proprietary compression schemes.
-
Even passive, coarse-grained attacks can steal individual pixels due to data-dependent compression output affecting memory traffic.