A Survey of Techniques for Improving Security of GPUs

Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and impro...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of hardware and systems security 2018-09, Vol.2 (3), p.266-285
Hauptverfasser: Mittal, Sparsh, Abhinaya, S. B., Reddy, Manish, Ali, Irfan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 285
container_issue 3
container_start_page 266
container_title Journal of hardware and systems security
container_volume 2
creator Mittal, Sparsh
Abhinaya, S. B.
Reddy, Manish
Ali, Irfan
description Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures.
doi_str_mv 10.1007/s41635-018-0039-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2932250864</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2932250864</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1610-9d8134c79ce81cf32282c204e09cb4d3d39a65b12946818e000d587bbcc03663</originalsourceid><addsrcrecordid>eNp1kMFKAzEQhoMoWLQP4G3Bc3Qmk80mx1K0FgoKrefQzWbrit2tSbfQtzd1RU-eZg7f_8_wMXaDcIcAxX2UqCjngJoDkOFwxkYiB8NJkjr_3YW-ZOMYmxIIhaLC0Ijlk2zZh4M_Zl2drbx7a5vP3ses7kI23-5Cd2jaTbb0rg_N_huavbzGa3ZRrz-iH__MK7Z6fFhNn_jieTafThbcoULgptJI0hXGeY2uJiG0cAKkB-NKWVFFZq3yEoWRSqP2AFDluihL54CUoit2O9SmP05f7e1714c2XbTCpLYctJKJwoFyoYsx-NruQrNdh6NFsCc_dvBjkx978mMhZcSQiYltNz78Nf8f-gJ_OmUP</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2932250864</pqid></control><display><type>article</type><title>A Survey of Techniques for Improving Security of GPUs</title><source>ProQuest Central UK/Ireland</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Mittal, Sparsh ; Abhinaya, S. B. ; Reddy, Manish ; Ali, Irfan</creator><creatorcontrib>Mittal, Sparsh ; Abhinaya, S. B. ; Reddy, Manish ; Ali, Irfan</creatorcontrib><description>Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures.</description><identifier>ISSN: 2509-3428</identifier><identifier>EISSN: 2509-3436</identifier><identifier>DOI: 10.1007/s41635-018-0039-0</identifier><language>eng</language><publisher>Cham: Springer International Publishing</publisher><subject>Algorithms ; Circuits and Systems ; Computer Hardware ; Cryptography ; Denial of service attacks ; Digital currencies ; Documentation ; Engineering ; Graphics processing units ; Information Systems Applications (incl.Internet) ; Load ; Malware ; Software ; Systems and Data Security</subject><ispartof>Journal of hardware and systems security, 2018-09, Vol.2 (3), p.266-285</ispartof><rights>Springer International Publishing AG, part of Springer Nature 2018</rights><rights>Springer International Publishing AG, part of Springer Nature 2018.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1610-9d8134c79ce81cf32282c204e09cb4d3d39a65b12946818e000d587bbcc03663</citedby><cites>FETCH-LOGICAL-c1610-9d8134c79ce81cf32282c204e09cb4d3d39a65b12946818e000d587bbcc03663</cites><orcidid>0000-0002-2908-993X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s41635-018-0039-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2932250864?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21387,27923,27924,33743,41487,42556,43804,51318,64384,64388,72340</link.rule.ids></links><search><creatorcontrib>Mittal, Sparsh</creatorcontrib><creatorcontrib>Abhinaya, S. B.</creatorcontrib><creatorcontrib>Reddy, Manish</creatorcontrib><creatorcontrib>Ali, Irfan</creatorcontrib><title>A Survey of Techniques for Improving Security of GPUs</title><title>Journal of hardware and systems security</title><addtitle>J Hardw Syst Secur</addtitle><description>Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures.</description><subject>Algorithms</subject><subject>Circuits and Systems</subject><subject>Computer Hardware</subject><subject>Cryptography</subject><subject>Denial of service attacks</subject><subject>Digital currencies</subject><subject>Documentation</subject><subject>Engineering</subject><subject>Graphics processing units</subject><subject>Information Systems Applications (incl.Internet)</subject><subject>Load</subject><subject>Malware</subject><subject>Software</subject><subject>Systems and Data Security</subject><issn>2509-3428</issn><issn>2509-3436</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kMFKAzEQhoMoWLQP4G3Bc3Qmk80mx1K0FgoKrefQzWbrit2tSbfQtzd1RU-eZg7f_8_wMXaDcIcAxX2UqCjngJoDkOFwxkYiB8NJkjr_3YW-ZOMYmxIIhaLC0Ijlk2zZh4M_Zl2drbx7a5vP3ses7kI23-5Cd2jaTbb0rg_N_huavbzGa3ZRrz-iH__MK7Z6fFhNn_jieTafThbcoULgptJI0hXGeY2uJiG0cAKkB-NKWVFFZq3yEoWRSqP2AFDluihL54CUoit2O9SmP05f7e1714c2XbTCpLYctJKJwoFyoYsx-NruQrNdh6NFsCc_dvBjkx978mMhZcSQiYltNz78Nf8f-gJ_OmUP</recordid><startdate>20180901</startdate><enddate>20180901</enddate><creator>Mittal, Sparsh</creator><creator>Abhinaya, S. B.</creator><creator>Reddy, Manish</creator><creator>Ali, Irfan</creator><general>Springer International Publishing</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PTHSS</scope><orcidid>https://orcid.org/0000-0002-2908-993X</orcidid></search><sort><creationdate>20180901</creationdate><title>A Survey of Techniques for Improving Security of GPUs</title><author>Mittal, Sparsh ; Abhinaya, S. B. ; Reddy, Manish ; Ali, Irfan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1610-9d8134c79ce81cf32282c204e09cb4d3d39a65b12946818e000d587bbcc03663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Algorithms</topic><topic>Circuits and Systems</topic><topic>Computer Hardware</topic><topic>Cryptography</topic><topic>Denial of service attacks</topic><topic>Digital currencies</topic><topic>Documentation</topic><topic>Engineering</topic><topic>Graphics processing units</topic><topic>Information Systems Applications (incl.Internet)</topic><topic>Load</topic><topic>Malware</topic><topic>Software</topic><topic>Systems and Data Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mittal, Sparsh</creatorcontrib><creatorcontrib>Abhinaya, S. B.</creatorcontrib><creatorcontrib>Reddy, Manish</creatorcontrib><creatorcontrib>Ali, Irfan</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Engineering Collection</collection><jtitle>Journal of hardware and systems security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mittal, Sparsh</au><au>Abhinaya, S. B.</au><au>Reddy, Manish</au><au>Ali, Irfan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey of Techniques for Improving Security of GPUs</atitle><jtitle>Journal of hardware and systems security</jtitle><stitle>J Hardw Syst Secur</stitle><date>2018-09-01</date><risdate>2018</risdate><volume>2</volume><issue>3</issue><spage>266</spage><epage>285</epage><pages>266-285</pages><issn>2509-3428</issn><eissn>2509-3436</eissn><abstract>Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest “link” in the security “chain”. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures.</abstract><cop>Cham</cop><pub>Springer International Publishing</pub><doi>10.1007/s41635-018-0039-0</doi><tpages>20</tpages><orcidid>https://orcid.org/0000-0002-2908-993X</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2509-3428
ispartof Journal of hardware and systems security, 2018-09, Vol.2 (3), p.266-285
issn 2509-3428
2509-3436
language eng
recordid cdi_proquest_journals_2932250864
source ProQuest Central UK/Ireland; SpringerLink Journals - AutoHoldings; ProQuest Central
subjects Algorithms
Circuits and Systems
Computer Hardware
Cryptography
Denial of service attacks
Digital currencies
Documentation
Engineering
Graphics processing units
Information Systems Applications (incl.Internet)
Load
Malware
Software
Systems and Data Security
title A Survey of Techniques for Improving Security of GPUs
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T10%3A16%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20of%20Techniques%20for%20Improving%20Security%20of%20GPUs&rft.jtitle=Journal%20of%20hardware%20and%20systems%20security&rft.au=Mittal,%20Sparsh&rft.date=2018-09-01&rft.volume=2&rft.issue=3&rft.spage=266&rft.epage=285&rft.pages=266-285&rft.issn=2509-3428&rft.eissn=2509-3436&rft_id=info:doi/10.1007/s41635-018-0039-0&rft_dat=%3Cproquest_cross%3E2932250864%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2932250864&rft_id=info:pmid/&rfr_iscdi=true