{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:08:59Z","timestamp":1763968139814,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660316","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"1131-1142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["PixelVault"],"prefix":"10.1145","author":[{"given":"Giorgos","family":"Vasiliadis","sequence":"first","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"unstructured":"Benchmarking TPM-backed SSL. http:\/\/blog.habets.pp.se\/2012\/02\/Benchmarking-TPMbacked-SSL.  Benchmarking TPM-backed SSL. http:\/\/blog.habets.pp.se\/2012\/02\/Benchmarking-TPMbacked-SSL.","key":"e_1_3_2_1_1_1"},{"unstructured":"CUDA Binary Utilities. http:\/\/docs.nvidia.com\/cuda\/cuda-binary-utilities\/index.html.  CUDA Binary Utilities. http:\/\/docs.nvidia.com\/cuda\/cuda-binary-utilities\/index.html.","key":"e_1_3_2_1_2_1"},{"unstructured":"Nouveau: Accelerated Open Source driver for nVidia cards. http:\/\/nouveau.freedesktop.org\/.  Nouveau: Accelerated Open Source driver for nVidia cards. http:\/\/nouveau.freedesktop.org\/.","key":"e_1_3_2_1_3_1"},{"unstructured":"NVIDIA Developer Forums - CUDA kernel timeout. https:\/\/devtalk.nvidia.com\/default\/topic\/417276\/cuda-kernel-timeout\/.  NVIDIA Developer Forums - CUDA kernel timeout. https:\/\/devtalk.nvidia.com\/default\/topic\/417276\/cuda-kernel-timeout\/.","key":"e_1_3_2_1_4_1"},{"unstructured":"OpenSSL Project. http:\/\/www.openssl.org\/.  OpenSSL Project. http:\/\/www.openssl.org\/.","key":"e_1_3_2_1_5_1"},{"unstructured":"pscnv - PathScale NVIDIA graphics driver. https:\/\/github.com\/pathscale\/pscnv.  pscnv - PathScale NVIDIA graphics driver. https:\/\/github.com\/pathscale\/pscnv.","key":"e_1_3_2_1_6_1"},{"unstructured":"shinpei0208 \/ gdev. https:\/\/github.com\/shinpei0208\/gdev.  shinpei0208 \/ gdev. https:\/\/github.com\/shinpei0208\/gdev.","key":"e_1_3_2_1_7_1"},{"unstructured":"TCG PC Client Specific - TPM Interface Specification (TIS) Version 1.2. http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/87BCE22B-1D09--3519-ADEBA772FBF02CBD\/TCG_PCClientTPMSpecification_1--20_1-00_FINAL.pdf.  TCG PC Client Specific - TPM Interface Specification (TIS) Version 1.2. http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/87BCE22B-1D09--3519-ADEBA772FBF02CBD\/TCG_PCClientTPMSpecification_1--20_1-00_FINAL.pdf.","key":"e_1_3_2_1_8_1"},{"unstructured":"The Heartbleed Bug. http:\/\/heartbleed.com\/.  The Heartbleed Bug. http:\/\/heartbleed.com\/.","key":"e_1_3_2_1_9_1"},{"unstructured":"Who holds the encryption keys? http:\/\/www.computerworld.com\/s\/article\/9225414\/Who_Holds_the_Keys_.  Who holds the encryption keys? http:\/\/www.computerworld.com\/s\/article\/9225414\/Who_Holds_the_Keys_.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"Cache-timing Attacks on AES","author":"Bernstein D. J.","year":"2004","unstructured":"D. J. Bernstein . Cache-timing Attacks on AES , 2004 . D. J. Bernstein. Cache-timing Attacks on AES, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2420950.2420961"},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer ScienceLecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/3-540-49649-1_3","volume-title":"An Attack on RSA Given a Small Fraction of the Private Key Bits","author":"Boneh D.","year":"1998","unstructured":"D. Boneh , G. Durfee , and Y. Frankel . An Attack on RSA Given a Small Fraction of the Private Key Bits . In Lecture Notes in Computer Science , volume 1514 of Lecture Notes in Computer Science , pages 25 -- 34 . Springer , 1998 . D. Boneh, G. Durfee, and Y. Frankel. An Attack on RSA Given a Small Fraction of the Private Key Bits. In Lecture Notes in Computer Science, volume 1514 of Lecture Notes in Computer Science, pages 25--34. Springer, 1998."},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Security","author":"Brumley D.","year":"2003","unstructured":"D. Brumley and D. Boneh . Remote Timing Attacks are Practical . In USENIX Security , 2003 . D. Brumley and D. Boneh. Remote Timing Attacks are Practical. In USENIX Security, 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security","author":"Brumley D.","year":"2004","unstructured":"D. Brumley and D. Song . Privtrans: Automatically Partitioning Programs for Privilege Separation . In USENIX Security , 2004 . D. Brumley and D. Song. Privtrans: Automatically Partitioning Programs for Privilege Separation. In USENIX Security, 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/1346281.1346284"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/11602897_31"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1007\/978-3-540-30574-3_23"},{"key":"e_1_3_2_1_19_1","volume-title":"AES Proposal: Rijndael","author":"Daemen J.","year":"1998","unstructured":"J. Daemen and V. Rijmen . AES Proposal: Rijndael , 1998 . J. Daemen and V. Rijmen. AES Proposal: Rijndael, 1998."},{"unstructured":"Eliseo Hernandez. Accelerate Performance Using OpenCL with Intel HD Graphics. http:\/\/software.intel.com\/en-us\/articles\/accelerateperformance-using-opencl-with-intel-hdgraphics.  Eliseo Hernandez. Accelerate Performance Using OpenCL with Intel HD Graphics. http:\/\/software.intel.com\/en-us\/articles\/accelerateperformance-using-opencl-with-intel-hdgraphics.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/2523649.2523656"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/SP.2011.22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security","author":"Harrison O.","year":"2008","unstructured":"O. Harrison and J. Waldron . Practical Symmetric Key Cryptography on Modern Graphics Hardware . In USENIX Security , 2008 . O. Harrison and J. Waldron. Practical Symmetric Key Cryptography on Modern Graphics Hardware. In USENIX Security, 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/978-3-642-02384-2_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2451116.2451146"},{"unstructured":"Intel. Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/329298-001.pdf.  Intel. Software Guard Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/files\/329298-001.pdf.","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1374376.1374438"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/2541940.2541986"},{"key":"e_1_3_2_1_30_1","volume-title":"NSDI","author":"Jang K.","year":"2011","unstructured":"K. Jang , S. Han , S. Han , K. Park , and S. Moon . SSLShader: Cheap SSL Acceleration with Commodity Processors . In NSDI , 2011 . K. Jang, S. Han, S. Han, K. Park, and S. Moon. SSLShader: Cheap SSL Acceleration with Commodity Processors. In NSDI, 2011."},{"unstructured":"Jon Stokes. AMD reveals Fusion CPU+GPU to challenge Intel in laptops. http:\/\/arstechnica.com\/business\/2010\/02\/amd-reveals-fusioncpugpu-to-challege-intel-in-laptops\/.  Jon Stokes. AMD reveals Fusion CPU+GPU to challenge Intel in laptops. http:\/\/arstechnica.com\/business\/2010\/02\/amd-reveals-fusioncpugpu-to-challege-intel-in-laptops\/.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","volume-title":"Implementing Open-Source CUDA Runtime","author":"Kato S.","year":"2013","unstructured":"S. Kato . Implementing Open-Source CUDA Runtime . 2013 . S. Kato. Implementing Open-Source CUDA Runtime. 2013."},{"key":"e_1_3_2_1_33_1","volume-title":"FREENIX","author":"Kilpatrick D.","year":"2003","unstructured":"D. Kilpatrick . Privman : A Library for Partitioning Applications . In FREENIX , 2003 . D. Kilpatrick. Privman: A Library for Partitioning Applications. In FREENIX, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/40.502403"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.5555\/646761.706156"},{"unstructured":"Luitjens Justin and Rennich Steven. CUDA Warps and Occupancy. http:\/\/on-demand.gputechconf.com\/gtc-express\/2011\/presentations\/cuda_webinars_WarpsAndOccupancy.pdf 2011.  Luitjens Justin and Rennich Steven. CUDA Warps and Occupancy. http:\/\/on-demand.gputechconf.com\/gtc-express\/2011\/presentations\/cuda_webinars_WarpsAndOccupancy.pdf 2011.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","volume-title":"FC","author":"Maurice C.","year":"2014","unstructured":"C. Maurice , C. Neumann , O. Heen , and A. Francillon . Confidentiality Issues on a GPU in a Virtualized Environment . In FC , 2014 . C. Maurice, C. Neumann, O. Heen, and A. Francillon. Confidentiality Issues on a GPU in a Virtualized Environment. In FC, 2014."},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX ATC","author":"Menychtas K.","year":"2013","unstructured":"K. Menychtas , K. Shen , and M. L. Scott . Enabling OS Research by Inferring Interactions in the Black-box GPU Stack . In USENIX ATC , 2013 . K. Menychtas, K. Shen, and M. L. Scott. Enabling OS Research by Inferring Interactions in the Black-box GPU Stack. In USENIX ATC, 2013."},{"unstructured":"P. Micikevicius. Local Memory and Register Spilling. http:\/\/on-demand.gputechconf.com\/gtcexpress\/2011\/presentations\/register_spilling.pdf.  P. Micikevicius. Local Memory and Register Spilling. http:\/\/on-demand.gputechconf.com\/gtcexpress\/2011\/presentations\/register_spilling.pdf.","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/1752046.1752053"},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX Security","author":"M\u00fcller T.","year":"2011","unstructured":"T. M\u00fcller , F. C. Freiling , and A. Dewald . TRESOR Runs Encryption Securely Outside RAM . In USENIX Security , 2011 . T. M\u00fcller, F. C. Freiling, and A. Dewald. TRESOR Runs Encryption Securely Outside RAM. In USENIX Security, 2011."},{"unstructured":"NVIDIA. CUDA Programming Guide version 4.0. http:\/\/developer.download.nvidia.com\/compute\/cuda\/4_0\/toolkit\/docs\/CUDA_C_Programming_Guide.pdf.  NVIDIA. CUDA Programming Guide version 4.0. http:\/\/developer.download.nvidia.com\/compute\/cuda\/4_0\/toolkit\/docs\/CUDA_C_Programming_Guide.pdf.","key":"e_1_3_2_1_42_1"},{"unstructured":"NVIDIA. Dynamic Parallelism in CUDA. http:\/\/developer.download.nvidia.com\/assets\/cuda\/files\/CUDADownloads\/TechBrief_Dynamic_Parallelism_in_CUDA.pdf.  NVIDIA. Dynamic Parallelism in CUDA. http:\/\/developer.download.nvidia.com\/assets\/cuda\/files\/CUDADownloads\/TechBrief_Dynamic_Parallelism_in_CUDA.pdf.","key":"e_1_3_2_1_43_1"},{"unstructured":"NVIDIA. Next Generation CUDA Compute Architecture: Fermi. http:\/\/www.nvidia.com\/content\/PDF\/fermi_white_papers\/NVIDIA_Fermi_Compute_Architecture_Whitepaper.pdf.  NVIDIA. Next Generation CUDA Compute Architecture: Fermi. http:\/\/www.nvidia.com\/content\/PDF\/fermi_white_papers\/NVIDIA_Fermi_Compute_Architecture_Whitepaper.pdf.","key":"e_1_3_2_1_44_1"},{"unstructured":"NVIDIA. NVIDIA's Next Generation CUDA Compute Architecture: Kepler GK110. http:\/\/www.nvidia.com\/content\/PDF\/kepler\/NVIDIA-Kepler-GK110-Architecture-Whitepaper.pdf.  NVIDIA. NVIDIA's Next Generation CUDA Compute Architecture: Kepler GK110. http:\/\/www.nvidia.com\/content\/PDF\/kepler\/NVIDIA-Kepler-GK110-Architecture-Whitepaper.pdf.","key":"e_1_3_2_1_45_1"},{"unstructured":"NVIDIA Developer Zone. Flushing Instruction Cache on GPU. https:\/\/devtalk.nvidia.com\/default\/topic\/467841\/flushing-instruction-cacheon-gpu\/.  NVIDIA Developer Zone. Flushing Instruction Cache on GPU. https:\/\/devtalk.nvidia.com\/default\/topic\/467841\/flushing-instruction-cacheon-gpu\/.","key":"e_1_3_2_1_46_1"},{"unstructured":"NVIDIA Developer Zone. PTX ISA :: CUDA Toolkit Documentation. http:\/\/docs.nvidia.com\/cuda\/ parallel-thread-execution\/index.html.  NVIDIA Developer Zone. PTX ISA :: CUDA Toolkit Documentation. http:\/\/docs.nvidia.com\/cuda\/ parallel-thread-execution\/index.html.","key":"e_1_3_2_1_47_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1007\/978-3-540-73614-1_12"},{"key":"e_1_3_2_1_49_1","volume-title":"ArXiv","author":"Pietro R. D.","year":"2013","unstructured":"R. D. Pietro , F. Lombardi , and A. Villani . CUDA Leaks: Information Leakage in GPU Architectures . ArXiv , May 2013 . R. D. Pietro, F. Lombardi, and A. Villani. CUDA Leaks: Information Leakage in GPU Architectures. ArXiv, May 2013."},{"key":"e_1_3_2_1_50_1","volume-title":"USENIX Security","author":"Provos N.","year":"2003","unstructured":"N. Provos , M. Friedl , and P. Honeyman . Preventing Privilege Escalation . In USENIX Security , 2003 . N. Provos, M. Friedl, and P. Honeyman. Preventing Privilege Escalation. In USENIX Security, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1145\/359340.359342"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/2043556.2043579"},{"key":"e_1_3_2_1_53_1","volume-title":"FC","author":"Shamir A.","year":"1999","unstructured":"A. Shamir and N. v. Someren. Playing \"Hide and Seek\" with Stored Keys . In FC , 1999 . A. Shamir and N. v. Someren. Playing \"Hide and Seek\" with Stored Keys. In FC, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.1109\/ICC.2006.255108"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1145\/2451116.2451169"},{"key":"e_1_3_2_1_56_1","volume-title":"Security through Amnesia: A Software-based Solution to the Cold-boot Attack on Disk Encryption. Technical report","author":"Simmons P.","year":"2011","unstructured":"P. Simmons . Security through Amnesia: A Software-based Solution to the Cold-boot Attack on Disk Encryption. Technical report , 2011 . P. Simmons. Security through Amnesia: A Software-based Solution to the Cold-boot Attack on Disk Encryption. Technical report, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1007\/978-3-642-37300-8_2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1007\/978-3-540-85053-3_6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_1_60_1","volume-title":"USENIX ATC","author":"Vasiliadis G.","year":"2014","unstructured":"G. Vasiliadis , L. Koromilas , M. Polychronakis , and S. Ioannidis . GASPP: A GPU-Accelerated Stateful Packet Processing Framework . In USENIX ATC , 2014 . G. Vasiliadis, L. Koromilas, M. Polychronakis, and S. Ioannidis. GASPP: A GPU-Accelerated Stateful Packet Processing Framework. In USENIX ATC, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1145\/2046707.2046741"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1109\/ISPASS.2010.5452013"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS'14","name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660316"}},"subtitle":["Using GPUs for Securing Cryptographic Operations"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":62,"alternative-id":["10.1145\/2660267.2660316","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660316","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}