With the application of machine learning to security-critical and sensitive domains, there is a growing need for integrity and privacy in computation using accelerators, such as GPUs. Unfortunately, the support for trusted execution on GPUs is currently very limited - trusted execution on accelerators is particularly challenging since the attestation mechanism should not reduce performance. Although hardware support for trusted execution on GPUs is emerging, we study purely software-based approaches for trusted GPU execution. A software-only approach offers distinct advantages: (1) complement hardware-based approaches, enhancing security especially when vulnerabilities in the hardware implementation degrade security, (2) operate on GPUs wit...
Abstract. General-Purpose computing on Graphics Processing Units (GPGPU) combined to cloud computing...
Recent advances in the massively parallel computational abilities of graphical processing units (GPU...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
With the application of machine learning to security-critical and sensitive domains, there is a grow...
Graphics Processing Units (GPUs) are becoming more and more prevalent in general-purpose computing. ...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
Driven by breakthroughs in mobile and IoT devices, on-device computation becomes promising. Meanwhil...
Even though graphics processors (GPUs) are becoming increasingly popular for general purpose computi...
International audienceThere is an increasing interest in Graphics Processing Units for general-purpo...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vuln...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Abstract. General-Purpose computing on Graphics Processing Units (GPGPU) combined to cloud computing...
Recent advances in the massively parallel computational abilities of graphical processing units (GPU...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
With the application of machine learning to security-critical and sensitive domains, there is a grow...
Graphics Processing Units (GPUs) are becoming more and more prevalent in general-purpose computing. ...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
Driven by breakthroughs in mobile and IoT devices, on-device computation becomes promising. Meanwhil...
Even though graphics processors (GPUs) are becoming increasingly popular for general purpose computi...
International audienceThere is an increasing interest in Graphics Processing Units for general-purpo...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vuln...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
Abstract. General-Purpose computing on Graphics Processing Units (GPGPU) combined to cloud computing...
Recent advances in the massively parallel computational abilities of graphical processing units (GPU...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...