Dark silicon is pushing processor vendors to add more specialized units such as accelerators to commodity processor chips. Unfortunately this is done without enough care to security. In this paper we look at the security implications of integrated Graphical Processor Units (GPUs) found in almost all mobile processors. We demonstrate that GPUs, already widely employed to accelerate a variety of benign applications such as image rendering, can also be used to 'accelerate' microarchitectural attacks (i.e., making them more effective) on commodity platforms. In particular, we show that an attacker can build all the necessary primitives for performing effective GPU-based microarchitectural attacks and that these primitives are all exposed to the...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...
Many of us use encryption frequently whether realising it or not; it is the active yet often invisib...
Attacks on data stored in mobile devices are increasingly getting more efficient and successful, esp...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. He...
International audienceThere is an increasing interest in Graphics Processing Units for general-purpo...
According to previous reports, information could be leaked from GPU memory; however, the security im...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...
Many of us use encryption frequently whether realising it or not; it is the active yet often invisib...
Attacks on data stored in mobile devices are increasingly getting more efficient and successful, esp...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by ...
One of the challenges encryption faces is it is computationally intensive and therefore slow, it is ...
International audienceThe microarchitecture of modern systems become more and more complicated. This...
After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. He...
International audienceThere is an increasing interest in Graphics Processing Units for general-purpo...
According to previous reports, information could be leaked from GPU memory; however, the security im...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...