{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:06:38Z","timestamp":1757588798280,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470986"},{"type":"electronic","value":"9783319470993"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47099-3_9","type":"book-chapter","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T11:16:42Z","timestamp":1475147802000},"page":"103-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A Study of Overflow Vulnerabilities on GPUs"],"prefix":"10.1007","author":[{"given":"Bang","family":"Di","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,30]]},"reference":[{"issue":"6","key":"9_CR1","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TC.2011.112","volume":"61","author":"L Shi","year":"2012","unstructured":"Shi, L., Chen, H., Sun, J., Li, K.: vCUDA: GPU-accelerated high-performance computing in virtual machines. IEEE Trans. Comput. 61(6), 804\u2013816 (2012)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"9_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2801153","volume":"15","author":"RD Pietro","year":"2016","unstructured":"Pietro, R.D., Lombardi, F., Villani, A.: CUDA leaks: a detailed hack for CUDA and a (partial) fix. ACM Trans. Embedded Comput. Syst. 15(1), 15 (2016)","journal-title":"ACM Trans. Embedded Comput. Syst."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Pai, S., Thazhuthaveetil, M.J., Govindarajan, R.: Improving GPGPU concurrency with elastic kernels. In: Architectural Support for Programming Languages and Operating Systems, ASPLOS 2013, Houston, TX, USA, 16\u201320 March 2013, pp. 407\u2013418 (2013)","DOI":"10.1145\/2499368.2451160"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Ravi, V.T., Becchi, M., Agrawal, G., Chakradhar, S.T.: Supporting GPU sharing in cloud environments with a transparent runtime consolidation framework. In: Proceedings of the 20th ACM International Symposium on High Performance Distributed Computing, HPDC 2011, San Jose, CA, USA, 8\u201311 June 2011, pp. 217\u2013228 (2011)","DOI":"10.1145\/1996130.1996160"},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s11416-015-0251-1","volume":"12","author":"A Miele","year":"2016","unstructured":"Miele, A.: Buffer overflow vulnerabilities in CUDA: a preliminary analysis. J. Comput. Virol. Hacking Techn. 12(2), 113\u2013120 (2016)","journal-title":"J. Comput. Virol. Hacking Techn."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Silberstein, M., Ford, B., Keidar, I., Witchel, E.: GPUfs: integrating a file system with GPUs. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems. ASPLOS 2013, pp. 485\u2013498. ACM (2013)","DOI":"10.1145\/2451116.2451169"},{"key":"9_CR7","unstructured":"NVIDIA: CUDA-MEMCHECK. \n                      https:\/\/developer.nvidia.com\/cuda-memcheck"},{"key":"9_CR8","unstructured":"Bre\u00df, S., Kiltz, S., Sch\u00e4ler, M.: Forensics on GPU coprocessing in databases - research challenges, first experiments, and countermeasures. In: Datenbanksysteme f\u00fcr Business, Technologie und Web (BTW), - Workshopband, 15. Fachtagung des GI-Fachbereichs \u201cDatenbanken und Informationssysteme\u201d (DBIS), 11\u201315 March 2013, Magdeburg, Germany. Proceedings, pp. 115\u2013129 (2013)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Lee, S., Kim, Y., Kim, J., Kim, J.: Stealing webpages rendered on your browser by exploiting GPU vulnerabilities. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, 18\u201321 May 2014, pp. 19\u201333 (2014)","DOI":"10.1109\/SP.2014.9"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-662-45472-5_9","volume-title":"Financial Cryptography and Data Security","author":"C Maurice","year":"2014","unstructured":"Maurice, C., Neumann, C., Heen, O., Francillon, A.: Confidentiality issues on a GPU in a virtualized environment. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 119\u2013135. Springer, Heidelberg (2014). doi:\n                      10.1007\/978-3-662-45472-5_9"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47099-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:11:32Z","timestamp":1603066292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47099-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470986","9783319470993"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47099-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"30 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}