A Survey of Techniques for Improving Security of GPUs
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and impro...
Gespeichert in:
Veröffentlicht in: | Journal of hardware and systems security 2018-09, Vol.2 (3), p.266-285 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 285 |
---|---|
container_issue | 3 |
container_start_page | 266 |
container_title | Journal of hardware and systems security |
container_volume | 2 |
creator | Mittal, Sparsh Abhinaya, S. B. Reddy, Manish Ali, Irfan |
description | Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures. |
doi_str_mv | 10.1007/s41635-018-0039-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2932250864</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2932250864</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1610-9d8134c79ce81cf32282c204e09cb4d3d39a65b12946818e000d587bbcc03663</originalsourceid><addsrcrecordid>eNp1kMFKAzEQhoMoWLQP4G3Bc3Qmk80mx1K0FgoKrefQzWbrit2tSbfQtzd1RU-eZg7f_8_wMXaDcIcAxX2UqCjngJoDkOFwxkYiB8NJkjr_3YW-ZOMYmxIIhaLC0Ijlk2zZh4M_Zl2drbx7a5vP3ses7kI23-5Cd2jaTbb0rg_N_huavbzGa3ZRrz-iH__MK7Z6fFhNn_jieTafThbcoULgptJI0hXGeY2uJiG0cAKkB-NKWVFFZq3yEoWRSqP2AFDluihL54CUoit2O9SmP05f7e1714c2XbTCpLYctJKJwoFyoYsx-NruQrNdh6NFsCc_dvBjkx978mMhZcSQiYltNz78Nf8f-gJ_OmUP</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2932250864</pqid></control><display><type>article</type><title>A Survey of Techniques for Improving Security of GPUs</title><source>ProQuest Central UK/Ireland</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Mittal, Sparsh ; Abhinaya, S. B. ; Reddy, Manish ; Ali, Irfan</creator><creatorcontrib>Mittal, Sparsh ; Abhinaya, S. B. ; Reddy, Manish ; Ali, Irfan</creatorcontrib><description>Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures.</description><identifier>ISSN: 2509-3428</identifier><identifier>EISSN: 2509-3436</identifier><identifier>DOI: 10.1007/s41635-018-0039-0</identifier><language>eng</language><publisher>Cham: Springer International Publishing</publisher><subject>Algorithms ; Circuits and Systems ; Computer Hardware ; Cryptography ; Denial of service attacks ; Digital currencies ; Documentation ; Engineering ; Graphics processing units ; Information Systems Applications (incl.Internet) ; Load ; Malware ; Software ; Systems and Data Security</subject><ispartof>Journal of hardware and systems security, 2018-09, Vol.2 (3), p.266-285</ispartof><rights>Springer International Publishing AG, part of Springer Nature 2018</rights><rights>Springer International Publishing AG, part of Springer Nature 2018.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1610-9d8134c79ce81cf32282c204e09cb4d3d39a65b12946818e000d587bbcc03663</citedby><cites>FETCH-LOGICAL-c1610-9d8134c79ce81cf32282c204e09cb4d3d39a65b12946818e000d587bbcc03663</cites><orcidid>0000-0002-2908-993X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s41635-018-0039-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2932250864?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21387,27923,27924,33743,41487,42556,43804,51318,64384,64388,72340</link.rule.ids></links><search><creatorcontrib>Mittal, Sparsh</creatorcontrib><creatorcontrib>Abhinaya, S. B.</creatorcontrib><creatorcontrib>Reddy, Manish</creatorcontrib><creatorcontrib>Ali, Irfan</creatorcontrib><title>A Survey of Techniques for Improving Security of GPUs</title><title>Journal of hardware and systems security</title><addtitle>J Hardw Syst Secur</addtitle><description>Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures.</description><subject>Algorithms</subject><subject>Circuits and Systems</subject><subject>Computer Hardware</subject><subject>Cryptography</subject><subject>Denial of service attacks</subject><subject>Digital currencies</subject><subject>Documentation</subject><subject>Engineering</subject><subject>Graphics processing units</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Load</subject><subject>Malware</subject><subject>Software</subject><subject>Systems and Data Security</subject><issn>2509-3428</issn><issn>2509-3436</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kMFKAzEQhoMoWLQP4G3Bc3Qmk80mx1K0FgoKrefQzWbrit2tSbfQtzd1RU-eZg7f_8_wMXaDcIcAxX2UqCjngJoDkOFwxkYiB8NJkjr_3YW-ZOMYmxIIhaLC0Ijlk2zZh4M_Zl2drbx7a5vP3ses7kI23-5Cd2jaTbb0rg_N_huavbzGa3ZRrz-iH__MK7Z6fFhNn_jieTafThbcoULgptJI0hXGeY2uJiG0cAKkB-NKWVFFZq3yEoWRSqP2AFDluihL54CUoit2O9SmP05f7e1714c2XbTCpLYctJKJwoFyoYsx-NruQrNdh6NFsCc_dvBjkx978mMhZcSQiYltNz78Nf8f-gJ_OmUP</recordid><startdate>20180901</startdate><enddate>20180901</enddate><creator>Mittal, Sparsh</creator><creator>Abhinaya, S. B.</creator><creator>Reddy, Manish</creator><creator>Ali, Irfan</creator><general>Springer International Publishing</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0002-2908-993X</orcidid></search><sort><creationdate>20180901</creationdate><title>A Survey of Techniques for Improving Security of GPUs</title><author>Mittal, Sparsh ; Abhinaya, S. B. ; Reddy, Manish ; Ali, Irfan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1610-9d8134c79ce81cf32282c204e09cb4d3d39a65b12946818e000d587bbcc03663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Circuits and Systems</topic><topic>Computer Hardware</topic><topic>Cryptography</topic><topic>Denial of service attacks</topic><topic>Digital currencies</topic><topic>Documentation</topic><topic>Engineering</topic><topic>Graphics processing units</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Load</topic><topic>Malware</topic><topic>Software</topic><topic>Systems and Data Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mittal, Sparsh</creatorcontrib><creatorcontrib>Abhinaya, S. B.</creatorcontrib><creatorcontrib>Reddy, Manish</creatorcontrib><creatorcontrib>Ali, Irfan</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><jtitle>Journal of hardware and systems security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mittal, Sparsh</au><au>Abhinaya, S. B.</au><au>Reddy, Manish</au><au>Ali, Irfan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Techniques for Improving Security of GPUs</atitle><jtitle>Journal of hardware and systems security</jtitle><stitle>J Hardw Syst Secur</stitle><date>2018-09-01</date><risdate>2018</risdate><volume>2</volume><issue>3</issue><spage>266</spage><epage>285</epage><pages>266-285</pages><issn>2509-3428</issn><eissn>2509-3436</eissn><abstract>Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures.</abstract><cop>Cham</cop><pub>Springer International Publishing</pub><doi>10.1007/s41635-018-0039-0</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0002-2908-993X</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2509-3428 |
ispartof | Journal of hardware and systems security, 2018-09, Vol.2 (3), p.266-285 |
issn | 2509-3428 2509-3436 |
language | eng |
recordid | cdi_proquest_journals_2932250864 |
source | ProQuest Central UK/Ireland; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Algorithms Circuits and Systems Computer Hardware Cryptography Denial of service attacks Digital currencies Documentation Engineering Graphics processing units Information Systems Applications (incl.Internet) Load Malware Software Systems and Data Security |
title | A Survey of Techniques for Improving Security of GPUs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T10%3A16%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Techniques%20for%20Improving%20Security%20of%20GPUs&rft.jtitle=Journal%20of%20hardware%20and%20systems%20security&rft.au=Mittal,%20Sparsh&rft.date=2018-09-01&rft.volume=2&rft.issue=3&rft.spage=266&rft.epage=285&rft.pages=266-285&rft.issn=2509-3428&rft.eissn=2509-3436&rft_id=info:doi/10.1007/s41635-018-0039-0&rft_dat=%3Cproquest_cross%3E2932250864%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2932250864&rft_id=info:pmid/&rfr_iscdi=true |