메뉴 건너뛰기




Volumn 2015-October, Issue , 2015, Pages 989-1003

Trusted display on untrusted commodity platforms

Author keywords

GPU separation kernel; Trusted display

Indexed keywords

COMPUTER GRAPHICS; HARDWARE; NETWORK SECURITY; PROGRAM PROCESSORS; RECONFIGURABLE HARDWARE; SEPARATION; VIRTUAL ADDRESSES; VIRTUAL REALITY;

EID: 84954131296     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813719     Document Type: Conference Paper
Times cited : (29)

References (56)
  • 9
    • 84954189555 scopus 로고    scopus 로고
    • System Programming. Pub. no. 24593 rev. 3.23
    • AMD. AMD 64 Architecture Programmer's Manual: Volume 2: System Programming. Pub. no. 24593 rev. 3.23, 2013.
    • (2013) AMD 64 Architecture Programmer's Manual , vol.2
    • AMD1
  • 13
    • 77952266871 scopus 로고    scopus 로고
    • GPU virtualization on vmware's hosted i/o architecture
    • July
    • M. Dowty and J. Sugerman. Gpu virtualization on vmware's hosted i/o architecture. SIGOPS Oper. Syst. Rev., 43(3):73-82, July 2009.
    • (2009) SIGOPS Oper. Syst. Rev. , vol.43 , Issue.3 , pp. 73-82
    • Dowty, M.1    Sugerman, J.2
  • 16
    • 53349090243 scopus 로고    scopus 로고
    • A closer look at GPUs
    • Oct
    • K. Fatahalian and M. Houston. A closer look at GPUs. Commun. ACM, 51(10):50-57, Oct. 2008.
    • (2008) Commun ACM , vol.51 , Issue.10 , pp. 50-57
    • Fatahalian, K.1    Houston, M.2
  • 19
    • 84921790825 scopus 로고    scopus 로고
    • Security limitations of virtualization and how to overcome them
    • Cambridge University
    • V. D. Gligor. Security limitations of virtualization and how to overcome them. In Proc. International Workshop on Security Protocols, Cambridge University, 2010.
    • (2010) Proc. International Workshop on Security Protocols
    • Gligor, V.D.1
  • 20
    • 62349096287 scopus 로고    scopus 로고
    • Screen oriented technique for reducing the incidence of shoulder surfing
    • B. Hoanca and K. J. Mock. Screen oriented technique for reducing the incidence of shoulder surfing. In Security and Management, pages 334-340, 2005.
    • (2005) Security and Management , pp. 334-340
    • Hoanca, B.1    Mock, K.J.2
  • 29
    • 84914100506 scopus 로고    scopus 로고
    • Stealing webpages rendered on your browser by exploiting GPU vulnerabilities
    • Berkeley, CA, USA, May 18-21, 2014
    • S. Lee, Y. Kim, J. Kim, and J. Kim. Stealing webpages rendered on your browser by exploiting GPU vulnerabilities. In 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pages 19-33, 2014.
    • (2014) 2014 IEEE Symposium on Security and Privacy, SP 2014 , pp. 19-33
    • Lee, S.1    Kim, Y.2    Kim, J.3    Kim, J.4
  • 30
    • 84914163660 scopus 로고    scopus 로고
    • Lessons from VAX/SVS for high assurance VM systems
    • S. Lipner, T. Jaeger, and M. E. Zurko. Lessons from VAX/SVS for high assurance VM systems. IEEE Security and Privacy, 10(6):26-35, 2012.
    • (2012) IEEE Security and Privacy , vol.10 , Issue.6 , pp. 26-35
    • Lipner, S.1    Jaeger, T.2    Zurko, M.E.3
  • 34
    • 84916634321 scopus 로고    scopus 로고
    • Confidentiality issues on a GPU in a virtualized environment
    • N. Christin and R. Safavi-Naini, editors, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, volume 8437 of Lecture Notes in Computer Science, Springer
    • C. Maurice, C. Neumann, O. Heen, and A. Francillon. Confidentiality issues on a GPU in a virtualized environment. In N. Christin and R. Safavi-Naini, editors, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, volume 8437 of Lecture Notes in Computer Science, pages 119-135. Springer, 2014.
    • (2014) Financial Cryptography and Data Security - 18th International Conference, FC 2014 , pp. 119-135
    • Maurice, C.1    Neumann, C.2    Heen, O.3    Francillon, A.4
  • 46
    • 85077449318 scopus 로고    scopus 로고
    • A full GPU virtualization solution with mediated pass-through
    • Philadelphia, PA, June. USENIX Association
    • K. Tian, Y. Dong, and D. Cowperthwaite. A full GPU virtualization solution with mediated pass-through. In 2014 USENIX Annual Technical Conference (USENIX ATC 14), pages 121-132, Philadelphia, PA, June 2014. USENIX Association.
    • (2014) 2014 USENIX Annual Technical Conference (USENIX ATC 14) , pp. 121-132
    • Tian, K.1    Dong, Y.2    Cowperthwaite, D.3
  • 52
    • 2942744785 scopus 로고    scopus 로고
    • Secure information display with limited viewing zone by use of multi-color visual cryptography
    • H. Yamamoto, Y. Hayasaki, and N. Nishida. Secure information display with limited viewing zone by use of multi-color visual cryptography. Optics express, 12(7):1258-1270, 2004.
    • (2004) Optics Express , vol.12 , Issue.7 , pp. 1258-1270
    • Yamamoto, H.1    Hayasaki, Y.2    Nishida, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.