{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T22:43:19Z","timestamp":1774219399222,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,4]],"date-time":"2018-02-04T00:00:00Z","timestamp":1517702400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1017785,CCF-1333594"],"award-info":[{"award-number":["CNS-1017785,CCF-1333594"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,4]]},"DOI":"10.1145\/3038228.3038233","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T10:18:54Z","timestamp":1487240334000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Understanding The Security of Discrete GPUs"],"prefix":"10.1145","author":[{"given":"Zhiting","family":"Zhu","sequence":"first","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Sangman","family":"Kim","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Yuri","family":"Rozhanski","sequence":"additional","affiliation":[{"name":"Technion-Israel Institute of Technology"}]},{"given":"Yige","family":"Hu","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Emmett","family":"Witchel","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Mark","family":"Silberstein","sequence":"additional","affiliation":[{"name":"Technion-Israel Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2017,2,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671247"},{"key":"e_1_3_2_1_2_1","unstructured":"Corp. I. Intel 965 Express Chipset Family and Intel G35 Express Chipset Graphics Controller Programmers Reference Manual. Volume 1: Graphics Core 2008. https:\/\/01.org\/sites\/default\/files\/documentation\/965_g35_vol_1_graphics_core_0.pdf."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Cui A.","year":"2013","unstructured":"Cui, A., Costello, M., and Stolfo, S. J. When firmware modifications attack: A case study of embedded exploitation. In Proceedings of the Network and Distributed System Security Symposium (NDSS) (2013)."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/www.cvedetails.com\/cve\/CVE-2007-1881\/","year":"2016","unstructured":"CVE. CVE-2007-1019. https:\/\/www.cvedetails.com\/cve\/CVE-2007-1881\/. Accessed: May 2016."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/www.cvedetails.com\/cve\/CVE-2011-1019\/","year":"2016","unstructured":"CVE. CVE-2011-1019. https:\/\/www.cvedetails.com\/cve\/CVE-2011-1019\/. Accessed: May 2016."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-5207","year":"2016","unstructured":"CVE. CVE-2014-5207. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-5207. Accessed: May 2016."},{"key":"e_1_3_2_1_7_1","unstructured":"CVE. CVE request: ro bind mount bypass using user namespaces. http:\/\/www.openwall.com\/lists\/oss-security\/2014\/08\/13\/9. Accessed: May 2016."},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/blog.includesecurity.com\/2014\/03\/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html","author":"How","year":"2016","unstructured":"CVE. How to exploit the x32 recvmmsg() kernel vulnerability CVE 2014-0038. http:\/\/blog.includesecurity.com\/2014\/03\/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html. Accessed: May 2016."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/github.com\/saelo\/cve-2014-0038","author":"Local","year":"2016","unstructured":"CVE. Local root exploit for CVE-2014. https:\/\/github.com\/saelo\/cve-2014-0038. Accessed: May 2016."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_20"},{"key":"e_1_3_2_1_11_1","volume-title":"Can you still trust your network card. CanSecWest\/core10","author":"Duflot L.","year":"2010","unstructured":"Duflot, L., Perez, Y.-A., Valadon, G., and Levillain, O. Can you still trust your network card. CanSecWest\/core10 (2010)."},{"key":"e_1_3_2_1_12_1","volume-title":"A crypto module loading vulnerability. https:\/\/lwn.net\/Articles\/630762\/","author":"Edge J.","year":"2016","unstructured":"Edge, J. A crypto module loading vulnerability. https:\/\/lwn.net\/Articles\/630762\/. Accessed: May 2016."},{"key":"e_1_3_2_1_13_1","volume-title":"envytools - tools for people envious of nvidia's blob driver. https:\/\/github.com\/envytools\/envytools","author":"Envytools","year":"2016","unstructured":"Envytools. envytools - tools for people envious of nvidia's blob driver. https:\/\/github.com\/envytools\/envytools. Accessed: May 2016."},{"key":"e_1_3_2_1_14_1","volume-title":"Activating the Intel VT-d virtualization feature. https:\/\/www.thomas-krenn.com\/en\/wiki\/Activating_the_Intel_VT-d_Virtualization_Feature","author":"Fischer W.","year":"2016","unstructured":"Fischer, W. Activating the Intel VT-d virtualization feature. https:\/\/www.thomas-krenn.com\/en\/wiki\/Activating_the_Intel_VT-d_Virtualization_Feature. Accessed: May 2016."},{"key":"e_1_3_2_1_15_1","unstructured":"freedesktop.org. nouveau context switching. http:\/\/nouveau.freedesktop.org\/wiki\/ContextSwitching\/. Accessed: May 2016."},{"key":"e_1_3_2_1_16_1","unstructured":"freedesktop.org. nouveau context switching firmware. http:\/\/nouveau.freedesktop.org\/wiki\/NVC0_Firmware\/. Accessed: May 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2606265.2606953"},{"key":"e_1_3_2_1_18_1","volume-title":"GPU Technology Conference","author":"Gerfin G.","year":"2012","unstructured":"Gerfin, G., and Venkataraman, V Debugging experience with CUDA-GDB and CUDA-MEMCHECK. In GPU Technology Conference (2012)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950398"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2nd Workshop on Transactional Computing (TRANSACT)","author":"Hofmann O. S.","year":"2007","unstructured":"Hofmann, O. S., Porter, D. E., Rossbach, C. J., Ramadan, H. E., and Witchel, E. Solving difficult HTM problems without difficult hardware. In Proceedings of the 2nd Workshop on Transactional Computing (TRANSACT) (Portland, OR, August 2007)."},{"key":"e_1_3_2_1_21_1","unstructured":"Kato S. Gdev: Open-source GPGPU runtime and driver software. https:\/\/github.com\/shinpei0208\/gdev."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342821.2342858"},{"key":"e_1_3_2_1_23_1","unstructured":"Khronos Group. The OpenCL Specification Version 2.0 2014."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Sixth European Workshop on System Security (EU-ROSEC)","author":"Koromilas L.","year":"2013","unstructured":"Koromilas, L., Vasiliadis, G., Ioannidis, S., Ladakis, E., and Polychronakis, M. You can type, but you can't hide: A stealthy GPU-based key-logger. In Proceedings of the Sixth European Workshop on System Security (EU-ROSEC) (2013), ACM."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694355"},{"key":"e_1_3_2_1_27_1","volume-title":"AMD x86 Firmware Analysis","author":"Mareck R.","year":"2016","unstructured":"Mareck, R. AMD x86 Firmware Analysis. Accessed: May 2016."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_9"},{"key":"e_1_3_2_1_29_1","unstructured":"nouveau. Nouveau: Accelerated open source driver for nvidia cards. http:\/\/nouveau.freedesktop.org\/wiki\/. Accessed: May 2016."},{"key":"e_1_3_2_1_30_1","unstructured":"NVIDIA. Debugger API. http:\/\/docs.nvidia.com\/cuda\/debugger-api\/index.html."},{"key":"e_1_3_2_1_31_1","unstructured":"NVIDIA. GPUDirectRDMA technology. http:\/\/docs.nvidia.com\/cuda\/gpudirect-rdma\/index.html."},{"key":"e_1_3_2_1_32_1","unstructured":"NVIDIA. NVIDIA Falcon security. ftp:\/\/download.nvidia.com\/open-gpu-doc\/Falcon-Security\/1\/Falcon-Security.html."},{"key":"e_1_3_2_1_33_1","volume-title":"CUDA Runtime API","author":"NVIDIA.","year":"2014","unstructured":"NVIDIA. CUDA Runtime API, 2014."},{"key":"e_1_3_2_1_34_1","unstructured":"Oleksiuk D. Breaking uefi security with software dma attacks. http:\/\/blog.cr4.sh\/2015\/09\/breaking-uefi-security-with-software.html. Accessed: May 2016."},{"key":"e_1_3_2_1_35_1","volume-title":"Johns Hopkins APL Technical Digest.","author":"Pendergrass J. A.","year":"2013","unstructured":"Pendergrass, J. A., and N. McGill, K. LKIM: The linux kernel integrity measurer. In Johns Hopkins APL Technical Digest. September 2013."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315260"},{"key":"e_1_3_2_1_37_1","volume-title":"2015 DFRWS Forensics Challenge","author":"Richard III, G","year":"2015","unstructured":"Richard III, G. GPU memory dump tool. 2015 DFRWS Forensics Challenge, 2015. http:\/\/cs.uno.edu\/~golden\/Materials\/gpumalware\/nvidia-dump-fb-1.0.tar.gz."},{"key":"e_1_3_2_1_38_1","volume-title":"WebGL-a new dimension for browser exploitation","author":"Security C. I.","unstructured":"Security, C. I. WebGL-a new dimension for browser exploitation. http:\/\/www.contextis.com\/resources\/blog\/webgl-new-dimension-browser-exploitation\/. Accessed: 2015-02-15."},{"key":"e_1_3_2_1_39_1","unstructured":"Security C. I. WebGL-more WebGL security flaws. http:\/\/www.contextis.com\/resources\/blog\/webgl-more-webgl-security-flaws\/. Accessed: May 2016."},{"key":"e_1_3_2_1_40_1","volume-title":"Funderbolt: Adventures in thunderbolt dma attacks. https:\/\/media.blackhat.com\/us-13\/US-13-Sevinsky-Funderbolt-Adventures-in-Thunderbolt-DMA-Attacks-Slides.pdf","author":"Sevinsky R.","year":"2016","unstructured":"Sevinsky, R. Funderbolt: Adventures in thunderbolt dma attacks. https:\/\/media.blackhat.com\/us-13\/US-13-Sevinsky-Funderbolt-Adventures-in-Thunderbolt-DMA-Attacks-Slides.pdf. Accessed: May 2016."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13515-1"},{"key":"e_1_3_2_1_42_1","unstructured":"Triulzi A. Project maux mk.ii. http:\/\/www.alchemistowl.org\/arrigo\/Papers\/Arrigo-Triulzi-PACSEC08-Project-Maux-II.pdf. Accessed: May 2016."},{"key":"e_1_3_2_1_43_1","first-page":"2014","volume-title":"National Vulnerability Database","author":"CERT.","year":"2014","unstructured":"US-CERT. Vulnerability summary for CVE-2014-8298. National Vulnerability Database, Dec 2014. http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-8298."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660316"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0262-9"},{"key":"e_1_3_2_1_46_1","volume-title":"DFRWS 2015, Annual Digital Forensics Research Conference","author":"Villani A.","year":"2015","unstructured":"Villani, A., Balzarotti, D., and di Pietro, R. The impact of GPU-assisted malware on memory forensics: A case study. In DFRWS 2015, Annual Digital Forensics Research Conference, Philadelphia, USA (2015)."},{"key":"e_1_3_2_1_47_1","volume-title":"Attacking Intel trusted execution technology. Black Hat DC","author":"Wojtczuk R.","year":"2009","unstructured":"Wojtczuk, R., and Rutkowska, J. Attacking Intel trusted execution technology. Black Hat DC (2009)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452013"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815695.1815718"},{"key":"e_1_3_2_1_50_1","volume-title":"Intel IOMMU Pass Through Support. https:\/\/lwn.net\/Articles\/329174\/","author":"Yu F.","year":"2016","unstructured":"Yu, F. Intel IOMMU Pass Through Support. https:\/\/lwn.net\/Articles\/329174\/. Accessed: May 2016."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523661"}],"event":{"name":"PPoPP '17: 22nd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming","location":"Austin TX USA","acronym":"PPoPP '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the General Purpose GPUs"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3038228.3038233","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3038228.3038233","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3038228.3038233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:45:40Z","timestamp":1763459140000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3038228.3038233"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,4]]},"references-count":51,"alternative-id":["10.1145\/3038228.3038233","10.1145\/3038228"],"URL":"https:\/\/doi.org\/10.1145\/3038228.3038233","relation":{},"subject":[],"published":{"date-parts":[[2017,2,4]]},"assertion":[{"value":"2017-02-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}