TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Generic and Automated Drive-By GPU Cache Attacks from the Browser [pdf]

29 点作者 bubblehack3r大约 1 年前

1 comment

nullifidian大约 1 年前
&gt;The simplest and most effective solution against a drive-by attack scenario is, in our opinion, to treat GPU access in the browser as a sensitive resource, like microphone or camera access, that requires permission before use. For WebGL and WebGPU, this is not currently the case (Firefox 114, Chrome 115, Chromium 117). This would also prevent malicious parties from stealthily using local computing resources for, e.g., cryptomining.<p>Personally, I&#x27;ve been wanting this for a decade or longer. But WebGL&#x2F;WebGPU is another vector for fingerprinting, and removing it from the available by default set of APIs would also lower the level of adoption, so I doubt they&#x27;ll allow to hide it behind a permission.