{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:37:56Z","timestamp":1743003476514,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662454718"},{"type":"electronic","value":"9783662454725"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45472-5_9","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T21:31:39Z","timestamp":1416000699000},"page":"119-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Confidentiality Issues on a GPU in a Virtualized Environment"],"prefix":"10.1007","author":[{"given":"Cl\u00e9mentine","family":"Maurice","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Neumann","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Heen","sequence":"additional","affiliation":[]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,9]]},"reference":[{"unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-0946 (2012)","key":"9_CR1"},{"unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-4225 (2012)","key":"9_CR2"},{"unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0109 (2013)","key":"9_CR3"},{"unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0110 (2013)","key":"9_CR4"},{"unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0131 (2013)","key":"9_CR5"},{"issue":"5","key":"9_CR6","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/1165389.945462","volume":"37","author":"P Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. ACM SIGOPS Oper. Syst. Rev. 37(5), 164\u2013177 (2003)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"doi-asserted-by":"crossref","unstructured":"Becchi, M., Sajjapongse, K., Graves, I., Procter, A., Ravi, V., Chakradhar, S.: virtual memory based runtime to support multi-tenancy in clusters with GPUs. In: HPDC\u201912 (2012)","key":"9_CR7","DOI":"10.1145\/2287076.2287090"},{"doi-asserted-by":"crossref","unstructured":"Bernemann, A., Schreyer, R., Spanderen, K.: Pricing structured equity products on gpus. In: Workshop on High Performance Computational Finance (WHPCF\u201910) (2010)","key":"9_CR8","DOI":"10.1109\/WHPCF.2010.5671821"},{"unstructured":"Bre\u00df, S., Kiltz, S., Sch\u00e4ler, M.: Forensics on GPU coprocessing in databases - research challenges, first experiments, and countermeasures. In: Workshop on Databases in Biometrics, Forensics and Security Applications (2013)","key":"9_CR9"},{"doi-asserted-by":"crossref","unstructured":"Chou, A., Yang, J., Chelf, B., Hallem, S., Engler, D.: An empirical study of operating systems errors. In: SOSP\u201901 (2001)","key":"9_CR10","DOI":"10.1145\/502034.502042"},{"doi-asserted-by":"crossref","unstructured":"Colp, P., Nanavati, M., Zhu, J., Aiello, W., Coker, G., Deegan, T., Loscocco, P., Warfield, A.: Breaking up is hard to do: security and functionality in a commodity hypervisor. In: SOSP\u201911 (2011)","key":"9_CR11","DOI":"10.1145\/2043556.2043575"},{"unstructured":"Di Pietro, R., Lombardi, F., Villani, A.: CUDA Leaks: Information Leakage in GPU Architectures (2013). arXiv:1305.7383v1","key":"9_CR12"},{"issue":"3","key":"9_CR13","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1618525.1618534","volume":"43","author":"M Dowty","year":"2009","unstructured":"Dowty, M., Sugerman, J.: GPU virtualization on VMware\u2019s hosted I\/O architecture. ACM SIGOPS Oper. Syst. Rev. 43(3), 73\u201382 (2009)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"unstructured":"Envytools. https:\/\/github.com\/envytools\/envytools","key":"9_CR14"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-642-15277-1_37","volume-title":"Euro-Par 2010 - Parallel Processing","author":"G Giunta","year":"2010","unstructured":"Giunta, G., Montella, R., Agrillo, G., Coviello, G.: A GPGPU transparent virtualization component for high performance computing clouds. In: D\u2019Ambra, P., Guarracino, M., Talia, D. (eds.) Euro-Par 2010, Part I. LNCS, vol. 6271, pp. 379\u2013391. Springer, Heidelberg (2010)"},{"unstructured":"gKrypt Engine. http:\/\/gkrypt.com\/","key":"9_CR16"},{"doi-asserted-by":"crossref","unstructured":"Gupta, V., Gavrilovska, A., Schwan, K., Kharche, H., Tolia, N., Talwar, V., Ranganathan, P.: GViM: GPU-accelerated virtual machines. In: HPCVirt\u201909 (2009)","key":"9_CR17","DOI":"10.1145\/1519138.1519141"},{"issue":"6","key":"9_CR18","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2010.187","volume":"8","author":"D Harnik","year":"2010","unstructured":"Harnik, D., Pinkas, B., Shulman-peleg, A.: Side channels in cloud services, the case of deduplication in cloud storage. IEEE Secur. Priv. 8(6), 40\u201347 (2010)","journal-title":"IEEE Secur. Priv."},{"unstructured":"Kato, S., McThrow, M., Maltzahn, C., Brandt, S.: Gdev: first-class GPU resource management in the operating system. In: USENIX ATC\u201912 (2012)","key":"9_CR19"},{"unstructured":"Kerrisk, M.: Xdc 2012: Graphics stack security (2012). https:\/\/lwn.net\/Articles\/517375\/","key":"9_CR20"},{"unstructured":"Kivity, A., Kamay, Y., Laor, D., Lublin, U., Liguori, A.: kvm: the linux virtual machine monitor. In: Proceedings of the Linux Symposium, pp. 225\u2013230 (2007)","key":"9_CR21"},{"unstructured":"Kolb, C., Pharr, M.: GPU Gems 2, chapter Options Pricing on the GPU (2005)","key":"9_CR22"},{"unstructured":"Kolivas, C.: cgminer. https:\/\/github.com\/ckolivas\/cgminer","key":"9_CR23"},{"unstructured":"Ladakis, E., Koromilas, L., Vasiliadis, G., Polychronakis, M., Ioannidis, S.: You can type, but you can\u2019t hide: a stealthy GPU-based keylogger. In: EuroSec\u201913 (2013)","key":"9_CR24"},{"issue":"2","key":"9_CR25","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MM.2008.31","volume":"28","author":"E Lindholm","year":"2008","unstructured":"Lindholm, E., Nickolls, J., Oberman, S., Montrym, J.: Nvidia Tesla: a unified graphics and computing architecture. IEEE Micro 28(2), 39\u201355 (2008)","journal-title":"IEEE Micro"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-17650-0_8","volume-title":"Information and Communications Security","author":"F Lombardi","year":"2010","unstructured":"Lombardi, F., Di Pietro, R.: CUDACS: securing the cloud with CUDA-enabled secure virtualization. In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 92\u2013106. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Lone Sang, F., Lacombe, E., Nicomette, V., Deswarte, Y.: Exploiting an I\/OMMU vulnerability. In: MALWARE\u201910 (2010)","key":"9_CR27","DOI":"10.1109\/MALWARE.2010.5665798"},{"unstructured":"Nouveau. http:\/\/nouveau.freedesktop.org","key":"9_CR28"},{"unstructured":"NVIDIA. TESLA M2050 \/ M2070 GPU computing module (2010)","key":"9_CR29"},{"unstructured":"NVIDIA. CUDA C Programming Guide (2012)","key":"9_CR30"},{"unstructured":"NVIDIA. NVIDIA GRID, GPU Acceleration for Virtualization, GPU Technology Conference (2013). http:\/\/on-demand.gputechconf.com\/gtc\/2013\/presentations\/S3501-NVIDIA-GRID-Virtualization.pdf","key":"9_CR31"},{"doi-asserted-by":"crossref","unstructured":"Owens, R., Wang, W.: Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines. In: IPCCC\u201911 (2011)","key":"9_CR32","DOI":"10.1109\/PCCC.2011.6108094"},{"unstructured":"Pathscale. https:\/\/github.com\/pathscale\/pscnv","key":"9_CR33"},{"doi-asserted-by":"crossref","unstructured":"Ravi, V.T., Becchi, M., Agrawal, G., Chakradhar, S.: Supporting GPU sharing in cloud environments with a transparent runtime consolidation framework. In: HPDC\u201911 (2011)","key":"9_CR34","DOI":"10.1145\/1996130.1996160"},{"doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: CCS\u201909 (2009)","key":"9_CR35","DOI":"10.1145\/1653662.1653687"},{"unstructured":"Shi, L., Chen, H., Sun, J.: vCUDA: GPU accelerated high performance computing in virtual machines. In: IPDPS\u201909 (2009)","key":"9_CR36"},{"unstructured":"Slaviero, M., Meer, H., Arvanitis, N.: Clobbering the Cloud, part 4 of 5, Blackhat (2009). http:\/\/www.sensepost.com\/blog\/3797.html","key":"9_CR37"},{"doi-asserted-by":"crossref","unstructured":"Smowton, C.: Secure 3D graphics for virtual machines. In: EuroSec\u201909 (2009)","key":"9_CR38","DOI":"10.1145\/1519144.1519150"},{"doi-asserted-by":"crossref","unstructured":"Suzaki, K., Iijima, K., Yagi, T., Artho, C.: Memory deduplication as a threat to the guest OS. In: European Workshop on System Security (2011)","key":"9_CR39","DOI":"10.1145\/1972551.1972552"},{"issue":"4","key":"9_CR40","first-page":"26","volume":"3","author":"X Tian","year":"2010","unstructured":"Tian, X., Benkrid, K.: High-performance quasi-monte carlo financial simulation: FPGA vs. GPP vs. GPU. ACM Trans. Reconfig. Technol. Syst. (TRETS) 3(4), 26 (2010)","journal-title":"ACM Trans. Reconfig. Technol. Syst. (TRETS)"},{"doi-asserted-by":"crossref","unstructured":"Vasiliadis, G., Polychronakis, M., Ioannidis, S.: GPU-assisted malware. In: International Conference on Malicious and Unwanted Software (2010)","key":"9_CR41","DOI":"10.1109\/MALWARE.2010.5665801"},{"doi-asserted-by":"crossref","unstructured":"Vinaya, M.S., Vydyanathan, N., Gajjar, M.: An evaluation of CUDA-enabled virtualization solutions. In: PDGC\u201912 (2012)","key":"9_CR42","DOI":"10.1109\/PDGC.2012.6449892"},{"unstructured":"Wojtczuk, R., Rutkowska, J.: Following the White Rabbit: Software attacks against Intel VT-d technology. invisiblethingslab.com (2011)","key":"9_CR43"},{"unstructured":"Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: high-speed covert channel attacks in the cloud. In: USENIX Security (2012)","key":"9_CR44"},{"unstructured":"Yamanouchi, T.: GPU Gems 3, chapter AES Encryption and Decryption on the GPU (2007)","key":"9_CR45"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: CCS\u201912 (2012)","key":"9_CR46","DOI":"10.1145\/2382196.2382230"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45472-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T09:13:52Z","timestamp":1674897232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-45472-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662454718","9783662454725"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45472-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"9 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}