{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:04:54Z","timestamp":1759133094963,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0424422"],"award-info":[{"award-number":["CCF-0424422"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813719","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"989-1003","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Trusted Display on Untrusted Commodity Platforms"],"prefix":"10.1145","author":[{"given":"Miao","family":"Yu","sequence":"first","affiliation":[{"name":"ECE Department and CyLab, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Virgil D.","family":"Gligor","sequence":"additional","affiliation":[{"name":"ECE Department and CyLab, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Zongwei","family":"Zhou","sequence":"additional","affiliation":[{"name":"ECE Department and CyLab, Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cairo-perf-trace. http:\/\/www.cairographics.org\/.  Cairo-perf-trace. http:\/\/www.cairographics.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Intel graphics driver. https:\/\/01.org\/linuxgraphics\/.  Intel graphics driver. https:\/\/01.org\/linuxgraphics\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Lima graphics driver for ARM Mali GPUs. http:\/\/limadriver.org\/.  Lima graphics driver for ARM Mali GPUs. http:\/\/limadriver.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Nouveau graphics driver. http:\/\/nouveau.freedesktop.org\/.  Nouveau graphics driver. http:\/\/nouveau.freedesktop.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Phoronix Test Suite. http:\/\/www.phoronix-test-suite.com\/.  Phoronix Test Suite. http:\/\/www.phoronix-test-suite.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Radeon graphics driver. http:\/\/www.x.org\/wiki\/radeon\/.  Radeon graphics driver. http:\/\/www.x.org\/wiki\/radeon\/."},{"key":"e_1_3_2_1_7_1","unstructured":"AMD. AMD Radeon documentation. http:\/\/www.x.org\/wiki\/RadeonFeature\/#index10h2.  AMD. AMD Radeon documentation. http:\/\/www.x.org\/wiki\/RadeonFeature\/#index10h2."},{"key":"e_1_3_2_1_8_1","volume-title":"no. 34434 rev. 1.26","author":"Pub AMD. AMD","year":"2009","unstructured":"AMD. AMD I\/O virtualization technology (IOMMU) specification. AMD Pub . no. 34434 rev. 1.26 , 2009 . AMD. AMD I\/O virtualization technology (IOMMU) specification. AMD Pub. no. 34434 rev. 1.26, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"AMD 64 Architecture Programmer's Manual: Volume 2: System Programming. Pub. no. 24593 rev. 3.23","author":"AMD.","year":"2013","unstructured":"AMD. AMD 64 Architecture Programmer's Manual: Volume 2: System Programming. Pub. no. 24593 rev. 3.23 , 2013 . AMD. AMD 64 Architecture Programmer's Manual: Volume 2: System Programming. Pub. no. 24593 rev. 3.23, 2013."},{"key":"e_1_3_2_1_10_1","unstructured":"ARM. Open source Mali-200\/300\/400\/450 GPU kernel device drivers. http:\/\/malideveloper.arm.com\/develop-for-mali\/drivers\/open-source-mali-%gpus-linux-kernel-device-drivers.  ARM. Open source Mali-200\/300\/400\/450 GPU kernel device drivers. http:\/\/malideveloper.arm.com\/develop-for-mali\/drivers\/open-source-mali-%gpus-linux-kernel-device-drivers."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_12"},{"key":"e_1_3_2_1_12_1","volume-title":"CUDA leaks: information leakage in GPU architectures. arXiv preprint arXiv:1305.7383","author":"Pietro R. Di","year":"2013","unstructured":"R. Di Pietro , F. Lombardi , and A. Villani . CUDA leaks: information leakage in GPU architectures. arXiv preprint arXiv:1305.7383 , 2013 . R. Di Pietro, F. Lombardi, and A. Villani. CUDA leaks: information leakage in GPU architectures. arXiv preprint arXiv:1305.7383, 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1618525.1618534"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2699840.2699846"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1991.213019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400181.1400197"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/52961"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. International Workshop on Security Protocols","author":"Gligor V. D.","year":"2010","unstructured":"V. D. Gligor . Security limitations of virtualization and how to overcome them . In Proc. International Workshop on Security Protocols , Cambridge University , 2010 . V. D. Gligor. Security limitations of virtualization and how to overcome them. In Proc. International Workshop on Security Protocols, Cambridge University, 2010."},{"key":"e_1_3_2_1_20_1","first-page":"334","volume-title":"Security and Management","author":"Hoanca B.","year":"2005","unstructured":"B. Hoanca and K. J. Mock . Screen oriented technique for reducing the incidence of shoulder surfing . In Security and Management , pages 334 -- 340 , 2005 . B. Hoanca and K. J. Mock. Screen oriented technique for reducing the incidence of shoulder surfing. In Security and Management, pages 334--340, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_22_1","unstructured":"Intel. Deeper levels of security with intel(r) identity protection technology. http:\/\/ipt.intel.com\/Libraries\/Documents\/Deeper_Levels_of_Security_with%_Intel%C2%AE_Identity_Protection_Technology.pdf.  Intel. Deeper levels of security with intel(r) identity protection technology. http:\/\/ipt.intel.com\/Libraries\/Documents\/Deeper_Levels_of_Security_with%_Intel%C2%AE_Identity_Protection_Technology.pdf."},{"key":"e_1_3_2_1_23_1","unstructured":"Intel. Intel processor graphics programmer's reference manual. https:\/\/01.org\/linuxgraphics\/documentation\/driver-documentation-prms.  Intel. Intel processor graphics programmer's reference manual. https:\/\/01.org\/linuxgraphics\/documentation\/driver-documentation-prms."},{"volume-title":"Intel virtualization technology for directed I\/O architecture specification. Intel Pub. no. D51397-006 rev. 2.2","year":"2013","key":"e_1_3_2_1_24_1","unstructured":"Intel. Intel virtualization technology for directed I\/O architecture specification. Intel Pub. no. D51397-006 rev. 2.2 , 2013 . Intel. Intel virtualization technology for directed I\/O architecture specification. Intel Pub. no. D51397-006 rev. 2.2, 2013."},{"key":"e_1_3_2_1_25_1","volume-title":"Intel 64 and IA-32 architectures software developer's manual: Volume 3: System programming guide. Pub. no. 253668-048US","author":"Intel Corporation","year":"2013","unstructured":"Intel Corporation . Intel 64 and IA-32 architectures software developer's manual: Volume 3: System programming guide. Pub. no. 253668-048US , 2013 . Intel Corporation. Intel 64 and IA-32 architectures software developer's manual: Volume 3: System programming guide. Pub. no. 253668-048US, 2013."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of the 54the Programming Symposium","author":"Kato S.","year":"2013","unstructured":"S. Kato . Implementing open-source CUDA runtime . In Proc. of the 54the Programming Symposium , 2013 . S. Kato. Implementing open-source CUDA runtime. In Proc. of the 54the Programming Symposium, 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_28_1","unstructured":"I. T. Lab. Qubes OS. https:\/\/qubes-os.org\/.  I. T. Lab. Qubes OS. https:\/\/qubes-os.org\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.87"},{"key":"e_1_3_2_1_31_1","unstructured":"D. C. P. LLC. High-bandwidth digital content protection system. www.digital-cp.com\/files\/static_page_files\/8006F925--129D-4C12-C87899B5A%76EF5C3\/HDCP_Specification%20Rev1_3.pdf.  D. C. P. LLC. High-bandwidth digital content protection system. www.digital-cp.com\/files\/static_page_files\/8006F925--129D-4C12-C87899B5A%76EF5C3\/HDCP_Specification%20Rev1_3.pdf."},{"key":"e_1_3_2_1_32_1","first-page":"836","volume-title":"ISBI 2008. 5th IEEE International Symposium on","author":"Luebke D.","year":"2008","unstructured":"D. Luebke . CUDA : Scalable parallel programming for high-performance scientific computing. In Biomedical Imaging: From Nano to Macro, 2008 . ISBI 2008. 5th IEEE International Symposium on , pages 836 -- 838 , May 2008 . D. Luebke. CUDA: Scalable parallel programming for high-performance scientific computing. In Biomedical Imaging: From Nano to Macro, 2008. ISBI 2008. 5th IEEE International Symposium on, pages 836--838, May 2008."},{"key":"e_1_3_2_1_33_1","first-page":"14","volume-title":"Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC'12","author":"Martignoni L.","year":"2012","unstructured":"L. Martignoni , P. Poosankam , M. Zaharia , J. Han , S. McCamant , D. Song , V. Paxson , A. Perrig , S. Shenker , and I. Stoica . Cloud terminal: Secure access to sensitive applications from untrusted systems . In Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC'12 , pages 14 -- 14 , Berkeley, CA, USA , 2012 . USENIX Association. L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica. Cloud terminal: Secure access to sensitive applications from untrusted systems. In Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC'12, pages 14--14, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_9"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053419"},{"key":"e_1_3_2_1_37_1","unstructured":"Nvidia. Virtual GPU technology. http:\/\/www.nvidia.com\/object\/virtual-gpus.html.  Nvidia. Virtual GPU technology. http:\/\/www.nvidia.com\/object\/virtual-gpus.html."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11733447_3"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.917757"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2666136"},{"key":"e_1_3_2_1_41_1","volume-title":"Glider: A GPU library driver for improved system security. CoRR, abs\/1411.3777","author":"Sani A. A.","year":"2014","unstructured":"A. A. Sani , L. Zhong , and D. S. Wallach . Glider: A GPU library driver for improved system security. CoRR, abs\/1411.3777 , 2014 . A. A. Sani, L. Zhong, and D. S. Wallach. Glider: A GPU library driver for improved system security. CoRR, abs\/1411.3777, 2014."},{"key":"e_1_3_2_1_42_1","first-page":"12","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Shapiro J. S.","year":"2004","unstructured":"J. S. Shapiro , J. Vanderburgh , E. Northup , and D. Chizmadia . Design of the EROS trusted window system . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 , SSYM'04, pages 12 -- 12 , Berkeley, CA, USA , 2004 . USENIX Association. J. S. Shapiro, J. Vanderburgh, E. Northup, and D. Chizmadia. Design of the EROS trusted window system. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13, SSYM'04, pages 12--12, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519144.1519150"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"key":"e_1_3_2_1_45_1","first-page":"109","volume-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)","author":"Suzuki Y.","year":"2014","unstructured":"Y. Suzuki , S. Kato , H. Yamada , and K. Kono . GPUvm: Why not virtualizing GPUs at the hypervisor? In 2014 USENIX Annual Technical Conference (USENIX ATC 14) , pages 109 -- 120 , Philadelphia, PA , June 2014 . USENIX Association. Y. Suzuki, S. Kato, H. Yamada, and K. Kono. GPUvm: Why not virtualizing GPUs at the hypervisor? In 2014 USENIX Annual Technical Conference (USENIX ATC 14), pages 109--120, Philadelphia, PA, June 2014. USENIX Association."},{"key":"e_1_3_2_1_46_1","first-page":"121","volume-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)","author":"Tian K.","year":"2014","unstructured":"K. Tian , Y. Dong , and D. Cowperthwaite . A full GPU virtualization solution with mediated pass-through . In 2014 USENIX Annual Technical Conference (USENIX ATC 14) , pages 121 -- 132 , Philadelphia, PA , June 2014 . USENIX Association. K. Tian, Y. Dong, and D. Cowperthwaite. A full GPU virtualization solution with mediated pass-through. In 2014 USENIX Annual Technical Conference (USENIX ATC 14), pages 121--132, Philadelphia, PA, June 2014. USENIX Association."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.36"},{"key":"e_1_3_2_1_48_1","unstructured":"VMWare. Graphics acceleration in view virtual desktops. http:\/\/www.vmware.com\/files\/pdf\/techpaper\/vmware-horizon-view-graphics-%acceleration-deployment.pdf.  VMWare. Graphics acceleration in view virtual desktops. http:\/\/www.vmware.com\/files\/pdf\/techpaper\/vmware-horizon-view-graphics-%acceleration-deployment.pdf."},{"key":"e_1_3_2_1_49_1","unstructured":"Wikipedia. Screen tearing. http:\/\/en.wikipedia.org\/wiki\/Screen_tearing.  Wikipedia. Screen tearing. http:\/\/en.wikipedia.org\/wiki\/Screen_tearing."},{"key":"e_1_3_2_1_50_1","volume-title":"Pearson Education","author":"Wilt N.","year":"2013","unstructured":"N. Wilt . The CUDA Handbook : A Comprehensive Guide to GPU Programming . Pearson Education , 2013 . N. Wilt. The CUDA Handbook: A Comprehensive Guide to GPU Programming. Pearson Education, 2013."},{"key":"e_1_3_2_1_51_1","unstructured":"Xen. Xen VGA passthrough fetched on 2015-01--19). http:\/\/wiki.xen.org\/wiki\/Xen_VGA_Passthrough .  Xen. Xen VGA passthrough fetched on 2015-01--19). http:\/\/wiki.xen.org\/wiki\/Xen_VGA_Passthrough ."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1364\/OPEX.12.001258"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493123.2462914"},{"key":"e_1_3_2_1_54_1","first-page":"19","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation -","volume":"7","author":"Zeldovich N.","year":"2006","unstructured":"N. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazi\u00e8res . Making information flow explicit in HiStar . In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7 , OSDI '06, pages 19 -- 19 , Berkeley, CA, USA , 2006 . USENIX Association. N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazi\u00e8res. Making information flow explicit in HiStar. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7, OSDI '06, pages 19--19, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.42"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.27"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813719","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:25Z","timestamp":1750225705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":56,"alternative-id":["10.1145\/2810103.2813719","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813719","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}