메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

Author keywords

Asynchronous memory access; Constraints; Coprocessor; CUDA; DMA; GPU; Graphics card; Host intrusion detection system; IDS

Indexed keywords

CO-PROCESSORS; CONSTRAINTS; CUDA; DMA; GPU; GRAPHICS CARD; HOST INTRUSION DETECTION SYSTEM; IDS; MEMORY ACCESS;

EID: 77956092967     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWSCN.2010.5497999     Document Type: Conference Paper
Times cited : (2)

References (28)
  • 2
  • 5
    • 85134783150 scopus 로고    scopus 로고
    • Using observations of invariant behavior to detect malicious agency in distributed environments
    • Volume 140 of Lecture Notes in Informatics, Mannheim, Germany
    • -, "Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Environments," in Proceedings of IT Incident Management and IT Forensics (IMF 2008). Volume 140 of Lecture Notes in Informatics, Mannheim, Germany, 2008, pp. 55-72.
    • (2008) Proceedings of IT Incident Management and IT Forensics (IMF 2008) , pp. 55-72
  • 6
    • 77956071702 scopus 로고    scopus 로고
    • Advanced Micro Devices [Online; accessed 01/18/2010]
    • Advanced Micro Devices, "ATI Stream Computing - Technical Overview," http://developer.amd.com/gpuassets/StreamComputingOverview.pdf, 2009, [Online; accessed 01/18/2010].
    • (2009) ATI Stream Computing - Technical Overview
  • 8
    • 0022882379 scopus 로고
    • Data parallel algorithms
    • Jr. G.L.S.
    • W. D. Hillis and G. L. S. Jr., "Data parallel algorithms," Commun. ACM, vol. 29, no. 12, pp. 1170-1183, 1986.
    • (1986) Commun. ACM , vol.29 , Issue.12 , pp. 1170-1183
    • Hillis, W.D.1
  • 11
    • 77956070208 scopus 로고    scopus 로고
    • [Online; accessed 04/02/2010]
    • Thomas Bradley, "Advanced CUDA Optimization - 3. Execution," http://www.gris.tu-darmstadt.de/cuda-workshop/tutorial/AdvancedCUDA03.pdf, 2010, [Online; accessed 04/02/2010].
    • (2010) Advanced CUDA Optimization - 3. Execution
    • Bradley, T.1
  • 12
    • 77956085251 scopus 로고    scopus 로고
    • NVIDIA Corporation NVIDIA CUDA SDK [Online; accessed 12/01/2009]
    • NVIDIA Corporation, "CUDA 2.2 Pinned Memory APIs," NVIDIA CUDA SDK, 2009, [Online; accessed 12/01/2009].
    • (2009) CUDA 2.2 Pinned Memory APIs
  • 13
    • 77956065279 scopus 로고    scopus 로고
    • [Online; accessed 01/18/2010]
    • -, "NVIDIA CUDA SDK," http://www.nvidia.com/object/cudasdks. html, 2010, [Online; accessed 01/18/2010].
    • (2010)
  • 14
    • 79957446666 scopus 로고    scopus 로고
    • Advanced Micro Devices [Online; accessed 01/18/2010]
    • Advanced Micro Devices, "ATI Stream SDK," http://developer.amd. com/gpu/ATIStreamSDK/Pages/default.aspx, 2010, [Online; accessed 01/18/2010].
    • (2010) ATI Stream SDK
  • 15
    • 77956086692 scopus 로고    scopus 로고
    • [Online; accessed 01/18/2010]
    • Khronos Group, "OpenCL," http://www.khronos.org/opencl/, 2010, [Online; accessed 01/18/2010].
    • (2010) OpenCL
  • 16
    • 77956074363 scopus 로고    scopus 로고
    • Advanced Micro Devices [Online; accessed 01/18/2010]
    • Advanced Micro Devices, "Open GPU Documentation," http://developer.amd.com/documentation/guides/Pages/default.aspx, 2010, [Online; accessed 01/18/2010].
    • (2010) Open GPU Documentation
  • 20
    • 77955858732 scopus 로고    scopus 로고
    • [Online; accessed 01/18/2010]
    • NVIDIA Corporation, "Fermi - NVIDIA's Next Generation CUDA Compute Architecture," http://www.nvidia.com/content/PDF/fermiwhitepapers/ NVIDIAFermiComputeArchitectureWhitepaper.pdf, 2009, [Online; accessed 01/18/2010].
    • (2009) Fermi - NVIDIA's Next Generation CUDA Compute Architecture
  • 21
    • 33845435188 scopus 로고    scopus 로고
    • Mondrix: Memory isolation for linux using mondriaan memory protection
    • E. Witchel, J. Rhee, and K. Asanović, "Mondrix: Memory Isolation for Linux using Mondriaan Memory Protection," SIGOPS Oper. Syst. Rev., vol. 39, no. 5, pp. 31-44, 2005.
    • (2005) SIGOPS Oper. Syst. Rev. , vol.39 , Issue.5 , pp. 31-44
    • Witchel, E.1    Rhee, J.2    Asanović, K.3
  • 22
    • 77950823828 scopus 로고    scopus 로고
    • Protecting commodity operating system kernels from vulnerable device drivers
    • Honolulu, Hawaii, USA: IEEE Computer Society Press, Los Alamitos, California, USA, December
    • S. Butt, V. Ganapathy, M. M. Swift, and C.-C. Chang, "Protecting Commodity Operating System Kernels from Vulnerable Device Drivers," in ACSAC'09: Proceedings of the 25th Annual Computer Security Applications Conference. Honolulu, Hawaii, USA: IEEE Computer Society Press, Los Alamitos, California, USA, December 2009, pp. 301-310.
    • (2009) ACSAC'09: Proceedings of the 25th Annual Computer Security Applications Conference , pp. 301-310
    • Butt, S.1    Ganapathy, V.2    Swift, M.M.3    Chang, C.-C.4
  • 27
    • 48649085344 scopus 로고    scopus 로고
    • Secure and flexible monitoring of virtual machines
    • B. D. Payne and W. Lee, "Secure and Flexible Monitoring of Virtual Machines," in ACSAC, 2007, pp. 385-397.
    • (2007) ACSAC , pp. 385-397
    • Payne, B.D.1    Lee, W.2
  • 28
    • 77950834189 scopus 로고    scopus 로고
    • TrustGraph: Trusted graphics subsystem for high assurance systems
    • IEEE Computer Society
    • H. Okhravi and D. M. Nicol, "TrustGraph: Trusted Graphics Subsystem for High Assurance Systems." in ACSAC. IEEE Computer Society, 2009, pp. 254-265.
    • (2009) ACSAC , pp. 254-265
    • Okhravi, H.1    Nicol, D.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.