Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics fields, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Unified Device Architecture) framework, it is not clear how b...
NVIDIA’s CUDA devices are increasingly being used in applications from accelerating computer graphic...
This thesis presents a new security policy enforcer designed for securing parallel computation on CU...
Pattern matching is an important task in a plethora of different fields ranging from computer scienc...
Recent advances in the massively parallel computational abilities of graphical processing units (GPU...
International audienceThere is an increasing interest in Graphics Processing Units for general-purpo...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
The purpose of this research is to perform a graphics recovery process on the GPU in line with the p...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs. ...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
Reverse engineering of file systems is indispensable for tool testing, accurate evidence acquisition...
This paper investigates the possibility of using forensically sound methods to recover the image dat...
The purpose of this project is to explore the GPU for general purpose computing. The GPU is a massi...
This book introduces readers to various threats faced during design and fabrication by today’s integ...
NVIDIA’s CUDA devices are increasingly being used in applications from accelerating computer graphic...
This thesis presents a new security policy enforcer designed for securing parallel computation on CU...
Pattern matching is an important task in a plethora of different fields ranging from computer scienc...
Recent advances in the massively parallel computational abilities of graphical processing units (GPU...
International audienceThere is an increasing interest in Graphics Processing Units for general-purpo...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
The purpose of this research is to perform a graphics recovery process on the GPU in line with the p...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs. ...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
Reverse engineering of file systems is indispensable for tool testing, accurate evidence acquisition...
This paper investigates the possibility of using forensically sound methods to recover the image dat...
The purpose of this project is to explore the GPU for general purpose computing. The GPU is a massi...
This book introduces readers to various threats faced during design and fabrication by today’s integ...
NVIDIA’s CUDA devices are increasingly being used in applications from accelerating computer graphic...
This thesis presents a new security policy enforcer designed for securing parallel computation on CU...
Pattern matching is an important task in a plethora of different fields ranging from computer scienc...