메뉴 건너뛰기




Volumn , Issue , 2017, Pages 61-73

Dynamic buffer overflow detection for GPGPUs

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; BENCHMARKING; BUFFER STORAGE; CRIME; PROGRAM PROCESSORS;

EID: 85015994987     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CGO.2017.7863729     Document Type: Conference Paper
Times cited : (20)

References (76)
  • 5
    • 85016016057 scopus 로고    scopus 로고
    • Software in silicon in the oracle SPARC M7 processor
    • K. Aingaran, S. Jairath, and D. Lutz. Software in Silicon in the Oracle SPARC M7 Processor. Presented at Hot Chips, 2016.
    • (2016) Hot Chips
    • Aingaran, K.1    Jairath, S.2    Lutz, D.3
  • 6
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One
    • Aleph One. Smashing the Stack for Fun and Profit. Phrack, 49(14), 1996.
    • (1996) Phrack , vol.49 , Issue.14
  • 7
    • 0004200684 scopus 로고
    • Technical Report ESD-TR-73-51, U.S. Air Force Electronic Systems Division, Oct
    • J. P. Anderson. Computer Security Technology Planning Study. Technical Report ESD-TR-73-51, U.S. Air Force Electronic Systems Division, Oct. 1972.
    • (1972) Computer Security Technology Planning Study
    • Anderson, J.P.1
  • 8
    • 85016007885 scopus 로고    scopus 로고
    • OpenCL WithAMDFirePro W9100
    • May. Accessed: 2016-12-02
    • G. Andryeyev. OpenCL withAMDFirePro W9100. Presented at Toronto SIGGRAPH. http://toronto.siggraph.org/ wp-content/uploads/2015/05/uoft-ocl.pdf, May 2015. Accessed: 2016-12-02.
    • (2015) Toronto SIGGRAPH
    • Andryeyev, G.1
  • 9
    • 85049220056 scopus 로고    scopus 로고
    • Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
    • P. Arkitidis, M. Costa, M. Castro, and S. Hand. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. In Proc. of the USENIX Security Symp., 2009.
    • (2009) Proc. of the USENIX Security Symp
    • Arkitidis, P.1    Costa, M.2    Castro, M.3    Hand, S.4
  • 10
    • 85016062417 scopus 로고    scopus 로고
    • Speicher-Debugging mit DUMA
    • H. Aygun. Speicher-Debugging mit DUMA. Programmieren unter Linux, 1(1):74-78, 2005.
    • (2005) Programmieren Unter Linux , vol.1 , Issue.1 , pp. 74-78
    • Aygun, H.1
  • 19
    • 84979239885 scopus 로고    scopus 로고
    • Qualcomm hexagon DSP: An architecture optimized for mobile multimedia and communications
    • L. Codrescu. Qualcomm Hexagon DSP: An Architecture Optimized for Mobile Multimedia and Communications. Presented at Hot Chips, 2013.
    • (2013) Hot Chips
    • Codrescu, L.1
  • 20
    • 85042970343 scopus 로고    scopus 로고
    • OpenCV on ti's dsp+arm® platforms: Mitigating the challenges of porting opencv to embedded platforms
    • J. Coombs and R. Prabhu. OpenCV on TI's DSP+ARM® Platforms: Mitigating the Challenges of Porting OpenCV to Embedded Platforms. Texas Instruments White Paper, 2011.
    • (2011) Texas Instruments White Paper
    • Coombs, J.1    Prabhu, R.2
  • 28
    • 85016083244 scopus 로고    scopus 로고
    • Inside 6th generation intel® core™: New microarchitecture code named skylake
    • J. Doweck and W. Kao. Inside 6th Generation Intel® Core™: New Microarchitecture Code Named Skylake. Presented at Hot Chips, 2016.
    • (2016) Hot Chips
    • Doweck, J.1    Kao, W.2
  • 29
    • 42549096729 scopus 로고    scopus 로고
    • Mudflap: Pointer use checking for C/C++
    • F. C. Eigler. Mudflap: Pointer Use Checking for C/C++. In GCC Developers Summit, 2003.
    • (2003) GCC Developers Summit
    • Eigler, F.C.1
  • 33
    • 78650002357 scopus 로고    scopus 로고
    • Understanding the heap by breaking it
    • J. N. Ferguson. Understanding the Heap By Breaking It. In Black Hat USA, 2007.
    • (2007) Black Hat USA
    • Ferguson, J.N.1
  • 40
    • 84903311213 scopus 로고    scopus 로고
    • HSA Foundation Accessed: 2016-12-02
    • HSA Foundation. Heterogeneous System Architecture. http://www.hsafoundation.com/. Accessed: 2016-12-02.
    • Heterogeneous System Architecture
  • 42
    • 85016072357 scopus 로고    scopus 로고
    • Accessed: 2016-12-02
    • Intel Corp. Intel® Inspector 2017. https://software. intel.com/en-us/intel-inspector-xe, 2016. Accessed: 2016-12-02.
    • (2016) Intel Corp. Intel® Inspector 2017
  • 44
    • 85016057269 scopus 로고    scopus 로고
    • Accessed: 2016-12-02
    • Khronos Group. WebCL Validator. https://github.com/ KhronosGroup/webcl-validator, 2014. Accessed: 2016-12-02.
    • (2014) Khronos Group. WebCL Validator
  • 46
    • 84980318229 scopus 로고    scopus 로고
    • Energy Efficient Graphics and Multimedia in 28nm Carrizo APU
    • G. Krishnan, D. Bouvier, L. Zhang, and P. Dongara. Energy Efficient Graphics and Multimedia in 28nm Carrizo APU. Presented at Hot Chips, 2015.
    • (2015) Hot Chips
    • Krishnan, G.1    Bouvier, D.2    Zhang, L.3    Dongara, P.4
  • 53
    • 85015994347 scopus 로고    scopus 로고
    • Memory corruption attacks: The (almost) complete history
    • H. Meer. Memory Corruption Attacks: The (almost) Complete History. In Black Hat USA, 2010.
    • (2010) Black Hat USA
    • Meer, H.1
  • 54
    • 84944706436 scopus 로고    scopus 로고
    • Buffer overflow vulnerabilities in CUDA: A preliminary analysis
    • May
    • A. Miele. Buffer Overflow Vulnerabilities in CUDA: A Preliminary Analysis. Journal of Computer Virology and Hacking Techniques, 12(2):113-120, May 2016.
    • (2016) Journal of Computer Virology and Hacking Techniques , vol.12 , Issue.2 , pp. 113-120
    • Miele, A.1
  • 60
    • 8344281803 scopus 로고
    • Accessed: 2016-12-02
    • B. Perens. Electric Fence. http://linux.die.net/man/ 3/efence, 1987. Accessed: 2016-12-02.
    • (1987) Electric Fence
    • Perens, B.1
  • 62
    • 84978534373 scopus 로고    scopus 로고
    • Fun with LD PRELOAD
    • K. Pulo. Fun with LD PRELOAD. Presented at linux.conf.au, 2009.
    • (2009) Linux.conf.au
    • Pulo, K.1
  • 75
    • 34047110218 scopus 로고    scopus 로고
    • Toward automated dynamic malware analysis using cwsandbox
    • March-April
    • C. Willems, T. Holz, and F. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy, 5(2):32-39, March-April 2007.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 32-39
    • Willems, C.1    Holz, T.2    Freiling, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.