{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T10:47:00Z","timestamp":1769510820283,"version":"3.49.0"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T00:00:00Z","timestamp":1452643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Prevention of and Fight against Crime Programme of the European Union European Commission\u2014Directorate\u2014General Home Affairs"},{"name":"European Antitrust Forensic IT Tools project"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2016,2,20]]},"abstract":"<jats:p>Graphics processing units (GPUs) are increasingly common on desktops, servers, and embedded platforms. In this article, we report on new security issues related to CUDA, which is the most widespread platform for GPU computing. In particular, details and proofs-of-concept are provided about novel vulnerabilities to which CUDA architectures are subject. We show how such vulnerabilities can be exploited to cause severe information leakage. As a case study, we experimentally show how to exploit one of these vulnerabilities on a GPU implementation of the AES encryption algorithm. Finally, we also suggest software patches and alternative approaches to tackle the presented vulnerabilities.<\/jats:p>","DOI":"10.1145\/2801153","type":"journal-article","created":{"date-parts":[[2016,1,16]],"date-time":"2016-01-16T16:34:35Z","timestamp":1452962075000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["CUDA Leaks"],"prefix":"10.1145","volume":"15","author":[{"given":"Roberto Di","family":"Pietro","sequence":"first","affiliation":[{"name":"Bell Labs, Nozay, France"}]},{"given":"Flavio","family":"Lombardi","sequence":"additional","affiliation":[{"name":"Istituto per le Applicazioni del Calcolo, IAC-CNR, Rome, Italy"}]},{"given":"Antonio","family":"Villani","sequence":"additional","affiliation":[{"name":"Roma Tre University, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2016,1,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952522.1952526"},{"key":"e_1_2_1_2_1","series-title":"Lecture Notes in Computer Science","volume-title":"Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication","author":"Barenghi Alessandro"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514641.2514644"},{"key":"e_1_2_1_4_1","volume-title":"Retrieved","author":"Black Nick","year":"2010"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501655"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015706.1015800"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537722"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161242"},{"key":"e_1_2_1_9_1","volume-title":"Retrieved","author":"Dongarra Jack","year":"1993"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0186-1"},{"key":"e_1_2_1_11_1","unstructured":"Donald Evans Phillip Bond and Arden Bement. 1994. FIPS PUB 140-2: Security Requirements for Cryptographic Modules. Available at http:\/\/www.csrc.nist.gov.  Donald Evans Phillip Bond and Arden Bement. 1994. FIPS PUB 140-2: Security Requirements for Cryptographic Modules. Available at http:\/\/www.csrc.nist.gov."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2010.55"},{"key":"e_1_2_1_13_1","unstructured":"Shi Guochun. 2012. CUDA Wrapper Library. Available at http:\/\/cudawrapper.sourceforge.net.  Shi Guochun. 2012. CUDA Wrapper Library. Available at http:\/\/cudawrapper.sourceforge.net."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566673"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110291890885"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.107"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11)","author":"Jang Keon","year":"2011"},{"key":"e_1_2_1_18_1","volume-title":"Retrieved","author":"Kato Shinpei","year":"2012"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 2011 USENIX Annual Technical Conference (USENIXATC'11)","author":"Kato Shinpei","year":"2011"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492385.2492387"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2009.5289128"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Paul Kocher Joshua Jaffe and Benjamin Jun. 1999. Differential Power Analysis. Springer-Verlag.  Paul Kocher Joshua Jaffe and Benjamin Jun. 1999. Differential Power Analysis. Springer-Verlag.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516712"},{"key":"e_1_2_1_24_1","volume-title":"Retrieved","author":"Larabel Michael","year":"2012"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080695.1069971"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1948352.1948363"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_9"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/948383.948413"},{"key":"e_1_2_1_30_1","volume-title":"Retrieved","author":"Micikevicius Paulius","year":"2011"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2011.40"},{"key":"e_1_2_1_32_1","volume-title":"Retrieved","author":"NVIDIA.","year":"2014"},{"key":"e_1_2_1_33_1","unstructured":"NVIDIA. 2014b. GRID GPUs. Available at http:\/\/www.nvidia.com\/object\/grid-technology.html.  NVIDIA. 2014b. GRID GPUs. Available at http:\/\/www.nvidia.com\/object\/grid-technology.html."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)","volume":"2","author":"Ors S. B.","year":"2004"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435227.2435260"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514641.2514652"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.28"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1698772.1698774"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.023"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.62"},{"key":"e_1_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Henk C. A. Van Tilborg and Sushil Jajodia (Eds.). 2011. Encyclopedia of Cryptography and Security (2nd ed.). Springer.   Henk C. A. Van Tilborg and Sushil Jajodia (Eds.). 2011. Encyclopedia of Cryptography and Security (2nd ed.). Springer.","DOI":"10.1007\/978-1-4419-5906-5"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660316"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995896.1995915"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the Annual Digital Forensics Research Conference (DFRWS'15)","author":"Villani Antonio","year":"2015"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the 2010 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS'10)","author":"Wong H."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076021.2048092"},{"key":"e_1_2_1_47_1","unstructured":"Zillians. 2012. VGPU GPU virtualization. Available at http:\/\/www.zillians.com.  Zillians. 2012. VGPU GPU virtualization. Available at http:\/\/www.zillians.com."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801153","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2801153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:13Z","timestamp":1750223233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801153"}},"subtitle":["A Detailed Hack for CUDA and a (Partial) Fix"],"short-title":[],"issued":{"date-parts":[[2016,1,13]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2,20]]}},"alternative-id":["10.1145\/2801153"],"URL":"https:\/\/doi.org\/10.1145\/2801153","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,13]]},"assertion":[{"value":"2014-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}