{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:58:49Z","timestamp":1772906329324,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03514-9","type":"journal-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T05:39:20Z","timestamp":1733463560000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["GPU Side-Channel Attack Classification for Targeted Secure Shader Mitigation"],"prefix":"10.1007","volume":"5","author":[{"given":"Nelson","family":"Lungu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9996-7681","authenticated-orcid":false,"given":"Sudhansu Shekhar","family":"Patra","sequence":"additional","affiliation":[]},{"given":"Manoj Ranjan","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Bibhuti Bhusan","family":"Dash","sequence":"additional","affiliation":[]},{"given":"Gopal Charan","family":"Sasmal","sequence":"additional","affiliation":[]},{"given":"Parthasarathi","family":"Pattnayak","sequence":"additional","affiliation":[]},{"given":"Satyendr","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Mahendra Kumar","family":"Gourisaria","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,6]]},"reference":[{"key":"3514_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.future.2022.12.038","volume":"142","author":"JM Cecilia","year":"2023","unstructured":"Cecilia JM, Morales-Garc\u00eda J, Imbern\u00f3n B, Prades J, Cano JC, Silla F. Using remote GPU virtualization techniques to enhance edge computing devices. Futur Gener Comput Syst. 2023;142:14\u201324.","journal-title":"Futur Gener Comput Syst"},{"key":"3514_CR2","unstructured":"NVIDIA Corporation. NVIDIA GeForce RTX 3090 Graphics Card. 2021. [Online]. https:\/\/www.nvidia.com\/en-us\/geforce\/graphics-cards\/30-series\/rtx-3090\/"},{"key":"3514_CR3","unstructured":"Horn J, Haas W, Prescher T, Gruss D, Lipp M, Mangard S, Schwarz M. Meltdown: reading kernel memory from user space. In: 27th security symposium security, vol. 18. 2018."},{"key":"3514_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.matcom.2023.06.001","volume":"224","author":"A Nazer","year":"2024","unstructured":"Nazer A, Manganiello P, Isabella O. A virtual bus parallel differential power processing configuration for photovoltaic applications. Math Comput Simul. 2024;224:49\u201362.","journal-title":"Math Comput Simul"},{"issue":"7","key":"3514_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/3399742","volume":"63","author":"P Kocher","year":"2020","unstructured":"Kocher P, Horn J, Fogh A, Genkin D, Gruss D, Haas W, Hamburg M, Lipp M, Mangard S, Prescher T, Schwarz M. Spectre attacks: exploiting speculative execution. Commun ACM. 2020;63(7):93\u2013101.","journal-title":"Commun ACM"},{"issue":"2","key":"3514_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3649455","volume":"21","author":"H Du","year":"2024","unstructured":"Du H, Qin Y, Chen S, Kang Y. FASA-DRAM: reducing DRAM latency with destructive activation and delayed restoration. ACM Trans Archit Code Optim. 2024;21(2):1\u201327.","journal-title":"ACM Trans Archit Code Optim"},{"key":"3514_CR7","unstructured":"NVIDIA Corporation. NVIDIA CUDA C++ programming guide [Online]. 2021. https:\/\/docs.nvidia.com\/cuda\/cuda-c-programming-guide\/."},{"key":"3514_CR8","unstructured":"NVIDIA Corporation. NVIDIA CUDA C++ best practices guide [Online]. 2021. https:\/\/docs.nvidia.com\/cuda\/cuda-c-best-practices-guide\/."},{"issue":"1","key":"3514_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11241-023-09409-x","volume":"60","author":"X Zhao","year":"2024","unstructured":"Zhao X, Wang H, Huang A, Wang D, Zhang G. Cluster-aware scheduling in multitasking GPUs. Real Time Syst. 2024;60(1):1\u201323.","journal-title":"Real Time Syst"},{"issue":"1","key":"3514_CR10","first-page":"326","volume":"12","author":"I Cialenco","year":"2024","unstructured":"Cialenco I, Kim HJ, Pasemann G. Statistical analysis of discretely sampled semilinear SPDEs: a power variation approach. Stochast Partial Differ Equ Anal Comput. 2024;12(1):326\u201351.","journal-title":"Stochast Partial Differ Equ Anal Comput"},{"key":"3514_CR11","doi-asserted-by":"crossref","unstructured":"Aydin F, Aysu A. Leaking secrets in homomorphic encryption with side-channel attacks.\u00a0J Cryptogr Eng. 2024;1\u201311.","DOI":"10.21203\/rs.3.rs-3097727\/v1"},{"key":"3514_CR12","doi-asserted-by":"crossref","unstructured":"He Z, Lee RB. How secure is your cache against side-channel attacks?. In: Proceedings of the 50th annual IEEE\/ACM international symposium on microarchitecture. 2017. pp. 341\u201353.","DOI":"10.1145\/3123939.3124546"},{"key":"3514_CR13","doi-asserted-by":"crossref","unstructured":"Wang Q, Wu B, Zhu P, Li P, Zuo W, Hu Q. ECA-Net: efficient channel attention for deep convolutional neural networks. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2020. pp. 11534\u201342.","DOI":"10.1109\/CVPR42600.2020.01155"},{"key":"3514_CR14","doi-asserted-by":"crossref","unstructured":"Naghibijouybari H, Khasawneh KN, Abu-Ghazaleh N. Constructing and characterizing covert channels on gpgpus. In: Proceedings of the 50th annual IEEE\/ACM international symposium on microarchitecture. 2017. pp. 354\u201366.","DOI":"10.1145\/3123939.3124538"},{"key":"3514_CR15","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s41635-018-0032-7","volume":"2","author":"C Luo","year":"2018","unstructured":"Luo C, Fei Y, Zhang L, Ding AA, Luo P, Mukherjee S, Kaeli D. Power analysis attack of an AES GPU implementation. J Hardw Syst Secur. 2018;2:69\u201382.","journal-title":"J Hardw Syst Secur"},{"key":"3514_CR16","doi-asserted-by":"publisher","first-page":"48945","DOI":"10.1109\/ACCESS.2023.3275757","volume":"11","author":"A Javeed","year":"2023","unstructured":"Javeed A, Yilmaz C, Savas E. Microarchitectural side-channel threats, weaknesses and mitigations: a systematic mapping study. IEEE Access. 2023;11:48945\u201376.","journal-title":"IEEE Access"},{"key":"3514_CR17","doi-asserted-by":"crossref","unstructured":"Naghibijouybari H, Neupane A, Qian Z, Abu-Ghazaleh N. Rendered insecure: Gpu side channel attacks are practical. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security. 2018. pp. 2139\u201353.","DOI":"10.1145\/3243734.3243831"},{"key":"3514_CR18","unstructured":"Rost RJ, Licea-Kane B, Ginsburg D, Kessenich J, Lichtenbelt B, Malan H, Weiblen M. OpenGL shading language. Pearson Education; 2009."},{"key":"3514_CR19","doi-asserted-by":"publisher","first-page":"77212","DOI":"10.1109\/ACCESS.2018.2879919","volume":"6","author":"KM Hosny","year":"2018","unstructured":"Hosny KM, Darwish MM, Li K, Salah A. Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access. 2018;6:77212\u201325.","journal-title":"IEEE Access"},{"key":"3514_CR20","doi-asserted-by":"crossref","unstructured":"Bernstein DJ. Curve25519: new Diffie-Hellman speed records. In: Public key cryptography-PKC 2006: 9th international conference on theory and practice in public-key cryptography, New York, NY, USA, April 24\u201326, 2006. Proceedings 9. Berlin: Springer. 2006. pp. 207\u201328.","DOI":"10.1007\/11745853_14"},{"issue":"1","key":"3514_CR21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10623-003-1160-8","volume":"36","author":"M Ciet","year":"2005","unstructured":"Ciet M, Joye M. Elliptic curve cryptosystems in the presence of permanent and transient faults. Des Codes Crypt. 2005;36(1):33\u201343.","journal-title":"Des Codes Crypt"},{"key":"3514_CR22","doi-asserted-by":"crossref","unstructured":"Rivain M, Prouff E. Provably secure higher-order masking of AES. In: International workshop on cryptographic hardware and embedded systems. Berlin: Springer; 2010. pp. 413\u201327.","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"3514_CR23","unstructured":"Brasser F, M\u00fcller U, Dmitrienko A, Kostiainen K, Capkun S, Sadeghi AR. Software grand exposure:{SGX} cache attacks are practical. In: 11th USENIX workshop on offensive technologies (WOOT 17). 2017."},{"key":"3514_CR24","doi-asserted-by":"crossref","unstructured":"Tehranipoor F, Yan W, Chandy JA. Robust hardware true random number generators using DRAM remanence effects. In: 2016 IEEE international symposium on hardware oriented security and trust (HOST), IEEE. 2016. pp. 79\u201384.","DOI":"10.1109\/HST.2016.7495561"},{"key":"3514_CR25","unstructured":"Brier E, Clavier C, Olivier F. Optimal statistical power analysis. Cryptology ePrint Archive. 2003."},{"key":"3514_CR26","unstructured":"Yarom Y, Falkner K. {FLUSH+ RELOAD}: a high resolution, low noise, l3 cache {side-channel} attack. In: 23rd USENIX security symposium (USENIX security 14). 2014. pp. 719\u201332."},{"key":"3514_CR27","doi-asserted-by":"crossref","unstructured":"Anders J, Andreu P, Becker B, Becker S, Cantoro R, Deligiannis NI, Elhamawy N, Faller T, Hernandez C, Mentens N, Rizi MN. A survey of recent developments in testability, safety and security of risc-v processors. In: 2023 IEEE European test symposium (ETS), IEEE. 2023. pp. 1\u201310.","DOI":"10.1109\/ETS56758.2023.10174099"},{"key":"3514_CR28","doi-asserted-by":"crossref","unstructured":"Kadam G, Zhang D, Jog A. Rcoal: mitigating gpu timing attack via subwarp-based randomized coalescing techniques. In: 2018 IEEE international symposium on high performance computer architecture (HPCA), IEEE. 2018. pp. 156\u201367.","DOI":"10.1109\/HPCA.2018.00023"},{"key":"3514_CR29","doi-asserted-by":"crossref","unstructured":"Faust S, Pietrzak K, Schipper J. Practical leakage-resilient symmetric cryptography. In Cryptographic hardware and embedded systems\u2013CHES 2012: 14th international workshop, Leuven, Belgium, September 9\u201312, 2012. Proceedings 14. Berlin: Springer; 2012. pp. 213\u201332.","DOI":"10.1007\/978-3-642-33027-8_13"},{"key":"3514_CR30","doi-asserted-by":"crossref","unstructured":"Zhou Z, Diao W, Liu X, Li Z, Zhang K, Liu R. Vulnerable gpu memory management: towards recovering raw data from gpu. 2016. arXiv:1605.06610.","DOI":"10.1515\/popets-2017-0016"},{"key":"3514_CR31","doi-asserted-by":"crossref","unstructured":"Gao Y, Cheng W, Zhang H, Zhou Y. Cache-collision attacks on GPU-based AES implementation with electro-magnetic leakages. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th ieee international conference on big data science and engineering (TrustCom\/BigDataSE), IEEE, pp. 300\u20136. 2018.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00053"},{"key":"3514_CR32","doi-asserted-by":"crossref","unstructured":"Karimi E, Jiang ZH, Fei Y, Kaeli D. A timing side-channel attack on a mobile gpu. In: 2018 IEEE 36th international conference on computer design (ICCD), IEEE. 2018. pp. 67\u201374.","DOI":"10.1109\/ICCD.2018.00020"},{"issue":"4","key":"3514_CR33","first-page":"1950","volume":"18","author":"H Naghibijouybari","year":"2019","unstructured":"Naghibijouybari H, Neupane A, Qian Z, Abu-Ghazaleh N. Side channel attacks on gpus. IEEE Trans Depend Secure Comput. 2019;18(4):1950\u201361.","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"4","key":"3514_CR34","first-page":"1974","volume":"18","author":"O Kwon","year":"2019","unstructured":"Kwon O, Kim Y, Huh J, Yoon H. ZeroKernel: secure context-isolated execution on commodity GPUs. IEEE Trans Depend Secure Comput. 2019;18(4):1974\u201388.","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"3514_CR35","doi-asserted-by":"crossref","unstructured":"Karimi E, Fei Y, Kaeli D. Hardware\/software obfuscation against timing side-channel attack on a GPU. In: 2020 IEEE international symposium on hardware oriented security and trust (HOST), IEEE. 2020. pp. 122\u201331.","DOI":"10.1109\/HOST45689.2020.9300259"},{"key":"3514_CR36","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/s41635-018-0039-0","volume":"2","author":"S Mittal","year":"2018","unstructured":"Mittal S, Abhinaya SB, Reddy M, Ali I. A survey of techniques for improving security of gpus. J Hardw Syst Secur. 2018;2:266\u201385.","journal-title":"J Hardw Syst Secur"},{"key":"3514_CR37","unstructured":"Yan M, Fletcher CW, Torrellas J. Cache telepathy: leveraging shared resource attacks to learn {DNN} architectures. In: 29th USENIX security symposium (USENIX security 20). 2020. pp. 2003\u201320."},{"issue":"1","key":"3514_CR38","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/COMST.2021.3126127","volume":"24","author":"O Ferraz","year":"2021","unstructured":"Ferraz O, Subramaniyan S, Chinthala R, Andrade J, Cavallaro JR, Nandy SK, Silva V, Zhang X, Purnaprajna M, Falcao G. A survey on high-throughput non-binary LDPC decoders: ASIC, FPGA, and GPU architectures. IEEE Commun Surv Tutor. 2021;24(1):524\u201356.","journal-title":"IEEE Commun Surv Tutor"},{"key":"3514_CR39","doi-asserted-by":"crossref","unstructured":"Zhao Y, Xue W, Chen W, Qiang W, Zou D, Jin H. Owl: differential-based side-channel leakage detection for CUDA applications. In\u00a02024 54th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE. 2024. pp. 362\u201376.","DOI":"10.1109\/DSN58291.2024.00044"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03514-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03514-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03514-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T06:07:10Z","timestamp":1733465230000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03514-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":39,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["3514"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03514-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"28 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approach"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"1148"}}