Proceedings of the 9th International Conference on Security of Information and Networks 2016
DOI: 10.1145/2947626.2947635
|View full text |Cite
|
Sign up to set email alerts
|

Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units

Abstract: This version is available at https://strathprints.strath.ac.uk/56898/ Strathprints is designed to allow users to access the research output of the University of Strathclyde. Unless otherwise explicitly stated on the manuscript, Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Please check the manuscript for details of any other licences that may have been applied. You may not engage in further distribution of the material for any pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
(12 reference statements)
0
1
0
Order By: Relevance
“…Bellekens et al [24] note that CUDA compilers generate ELF binaries which have high-level assembly PTX code. Note that ELF is a file format for shared binaries, object code and executable files.…”
Section: Leakage Through Binariesmentioning
confidence: 99%
“…Bellekens et al [24] note that CUDA compilers generate ELF binaries which have high-level assembly PTX code. Note that ELF is a file format for shared binaries, object code and executable files.…”
Section: Leakage Through Binariesmentioning
confidence: 99%