Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an atta...
NVIDIA’s CUDA devices are increasingly being used in applications from accelerating computer graphic...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
Pattern matching is an important task in a plethora of different fields ranging from computer scienc...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
AbstractIn this paper we assess the impact of GPU-assisted malware on memory forensics. In particula...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vuln...
Graphics Processing Units (GPUs) are increasingly adopted in several domains where reliability is fu...
In the past decade Graphics Processing Units (GPUs) have advanced from simple fixed function graphic...
We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs. ...
Graphics Processing Units (GPUs) are becoming more and more prevalent in general-purpose computing. ...
The purpose of this research is to perform a graphics recovery process on the GPU in line with the p...
Abstract. General-Purpose computing on Graphics Processing Units (GPGPU) combined to cloud computing...
In recent years, Graphics Processing Units (GPUs) have become a de facto choice to accelerate the co...
Abstract According to previous reports, information could be leaked from GPU memory; ...
NVIDIA’s CUDA devices are increasingly being used in applications from accelerating computer graphic...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
Pattern matching is an important task in a plethora of different fields ranging from computer scienc...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
AbstractIn this paper we assess the impact of GPU-assisted malware on memory forensics. In particula...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vuln...
Graphics Processing Units (GPUs) are increasingly adopted in several domains where reliability is fu...
In the past decade Graphics Processing Units (GPUs) have advanced from simple fixed function graphic...
We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs. ...
Graphics Processing Units (GPUs) are becoming more and more prevalent in general-purpose computing. ...
The purpose of this research is to perform a graphics recovery process on the GPU in line with the p...
Abstract. General-Purpose computing on Graphics Processing Units (GPGPU) combined to cloud computing...
In recent years, Graphics Processing Units (GPUs) have become a de facto choice to accelerate the co...
Abstract According to previous reports, information could be leaked from GPU memory; ...
NVIDIA’s CUDA devices are increasingly being used in applications from accelerating computer graphic...
Graphics Processing Units (GPUs) were introduced as peripheral devices for accelerating graphics and...
Pattern matching is an important task in a plethora of different fields ranging from computer scienc...