Secure Smart Embedded Devices, Platforms and Applications 2013
DOI: 10.1007/978-1-4614-7915-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Graphics Processing Units

Abstract: Graphics Processing Units (GPUs) are coprocessors that traditionally perform the rendering of 2-dimensional and 3-dimensional graphics information for display on a screen. In particular computer games request more and more realistic real-time rendering of graphics data and so GPUs became more and more powerful highly parallel specialist computing units. It did not take long until programmers realized that this computational power can also be used for tasks other than computer graphics. For example already in 1… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 26 publications
(23 reference statements)
0
1
0
Order By: Relevance
“…Contrary to the CPU, which provides security features such as memory protection and therefore has clear reasons to prevent direct access to the SRAM, GPUs often expose their SRAM directly to the programmer, and also do not have the same reasons to clear the SRAM after reset. GPU memory and registers leak sensitive data between processes, as observed in [21] and later in [8]; the absence of memory zeroing between processes, where sensitive data may be handled, suggests that zeroing to prevent reading uninitialized memory is also absent.…”
Section: Introductionmentioning
confidence: 99%
“…Contrary to the CPU, which provides security features such as memory protection and therefore has clear reasons to prevent direct access to the SRAM, GPUs often expose their SRAM directly to the programmer, and also do not have the same reasons to clear the SRAM after reset. GPU memory and registers leak sensitive data between processes, as observed in [21] and later in [8]; the absence of memory zeroing between processes, where sensitive data may be handled, suggests that zeroing to prevent reading uninitialized memory is also absent.…”
Section: Introductionmentioning
confidence: 99%