2014
DOI: 10.1007/978-3-319-12160-4_29
|View full text |Cite
|
Sign up to set email alerts
|

Dark Side of the Shader: Mobile GPU-Aided Malware Delivery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Several examples of GPU-assisted malware have been analyzed so far (Vasiliadis et al, Oct 2010;Ladakis et al, 2013;Triulzi, 2008;Danisevskis et al, 2014). For instance, in Ladakis et al (2013) the GPU is used to implement a stealthy keylogger.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…Several examples of GPU-assisted malware have been analyzed so far (Vasiliadis et al, Oct 2010;Ladakis et al, 2013;Triulzi, 2008;Danisevskis et al, 2014). For instance, in Ladakis et al (2013) the GPU is used to implement a stealthy keylogger.…”
Section: Related Workmentioning
confidence: 97%
“…In Triulzi (2008) the author shows how the GPU and NIC with a malicious firmware can be used to exfiltrate data from the host's memory. Finally, in Danisevskis et al (2014) the authors describe an attack targeting a mobile GPU. In such case a vulnerability in the driver is exploited to take over the memory protection mechanism of the GPU.…”
Section: Related Workmentioning
confidence: 99%
“…Our research results show that the TDR is not foolproof. There are still potential vulnerabilities that attackers can exploit to bypass the TDR and execute malicious code on the GPU memory [47]. We tempted attacks on windows 7 with Nvidia GPU and Intel GPU, windows 10 with Nvidia GPU and Intel GPU and Windows 11 with integrated iRIS GPU.…”
Section: Gpu Dos Vulnerabilitiesmentioning
confidence: 99%
“…They also recommend that checking the graphic page tables, hangcheck flag, list of buffer objects, contexts and register files can provide an insight into the type of malware present. Danisevskis et al [37] demonstrate an attack whereby an adversary can exploit DMA to bypass GPU memory protection schemes and gain access to privileged regions of the memory. They demonstrate these attacks on an Android smart-phone with sound memory isolation and security mechanisms.…”
Section: Tablementioning
confidence: 99%