{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:25:24Z","timestamp":1725621924256},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T00:00:00Z","timestamp":1468972800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,20]]},"DOI":"10.1145\/2947626.2947635","type":"proceedings-article","created":{"date-parts":[[2016,7,12]],"date-time":"2016-07-12T12:11:05Z","timestamp":1468325465000},"page":"166-173","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units"],"prefix":"10.1145","author":[{"given":"Xavier","family":"Bellekens","sequence":"first","affiliation":[{"name":"Abertay University, Dundee, United Kingdom"}]},{"given":"Greig","family":"Paul","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"Christos","family":"Tachtatzis","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"James","family":"Irvine","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"Robert","family":"Atkinson","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140493"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659723"},{"key":"e_1_3_2_1_3_1","unstructured":"S. Bre\u00df S. Kiltz and M. Sch\u00e4ler. Forensics on GPU coprocessing in databases - research challenges first experiments and countermeasures. In Datenbanksysteme f\u00fcr Business Technologie und Web (BTW) - Workshopband 15. Fachtagung des GI-Fachbereichs \"Datenbanken und Informationssysteme\" (DBIS) 11.-15.3.2013 in Magdeburg Germany. Proceedings pages 115--129 2013. S. Bre\u00df S. Kiltz and M. Sch\u00e4ler. Forensics on GPU coprocessing in databases - research challenges first experiments and countermeasures. In Datenbanksysteme f\u00fcr Business Technologie und Web (BTW) - Workshopband 15. Fachtagung des GI-Fachbereichs \"Datenbanken und Informationssysteme\" (DBIS) 11.-15.3.2013 in Magdeburg Germany. Proceedings pages 115--129 2013."},{"key":"e_1_3_2_1_4_1","volume-title":"Professional CUDA C Programming. EBL-Schweitzer","author":"Cheng J.","year":"2014","unstructured":"J. Cheng , M. Grossman , and T. McKercher . Professional CUDA C Programming. EBL-Schweitzer . Wiley , 2014 . J. Cheng, M. Grossman, and T. McKercher. Professional CUDA C Programming. EBL-Schweitzer. Wiley, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.43044"},{"key":"e_1_3_2_1_6_1","volume-title":"Morgan Kaufmann","author":"Cook S.","year":"2013","unstructured":"S. Cook . CUDA Programming : A Developer's Guide to Parallel Computing with GPUs. Applications of GPU computing series . Morgan Kaufmann , 2013 . S. Cook. CUDA Programming: A Developer's Guide to Parallel Computing with GPUs. Applications of GPU computing series. Morgan Kaufmann, 2013."},{"key":"e_1_3_2_1_7_1","unstructured":"D. Distler. SANS institute - malware analysis: An introduction. D. Distler. SANS institute - malware analysis: An introduction."},{"key":"e_1_3_2_1_8_1","volume-title":"Ptx2kernel: Converting ptx code into compilable kernels","author":"Dong Q.","year":"2015","unstructured":"Q. Dong , T. Li , S. Zhang , X. Jiao , and J. Leng . Ptx2kernel: Converting ptx code into compilable kernels . 2015 . Q. Dong, T. Li, S. Zhang, X. Jiao, and J. Leng. Ptx2kernel: Converting ptx code into compilable kernels. 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"Reversing: Secrets of Reverse Engineering","author":"Eilam E.","year":"2011","unstructured":"E. Eilam . Reversing: Secrets of Reverse Engineering . Wiley , 2011 . E. Eilam. Reversing: Secrets of Reverse Engineering. Wiley, 2011."},{"key":"e_1_3_2_1_10_1","unstructured":"G. Giunta R. Montella G. Agrillo and G. Coviello. gVirtuS: A GPGPU transparent virtualization component. G. Giunta R. Montella G. Agrillo and G. Coviello. gVirtuS: A GPGPU transparent virtualization component."},{"key":"e_1_3_2_1_11_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-642-38908-5_13","volume-title":"M. Huth, N. Asokan, S. \u010capkun","author":"Huang H.","year":"2013","unstructured":"H. Huang , S. Zhu , P. Liu , and D. Wu . A framework for evaluating mobile app repackaging detection algorithms . In M. Huth, N. Asokan, S. \u010capkun , I. Flechais, and L. Coles-Kemp, editors, Trust and Trustworthy Computing, volume 7904 of Lecture Notes in Computer Science , pages 169 -- 186 . Springer Berlin Heidelberg , 2013 . H. Huang, S. Zhu, P. Liu, and D. Wu. A framework for evaluating mobile app repackaging detection algorithms. In M. Huth, N. Asokan, S. \u010capkun, I. Flechais, and L. Coles-Kemp, editors, Trust and Trustworthy Computing, volume 7904 of Lecture Notes in Computer Science, pages 169--186. Springer Berlin Heidelberg, 2013."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 6th European Workshop on System Security (EuroSec)","author":"Ladakis E.","year":"2013","unstructured":"E. Ladakis , L. Koromilas , G. Vasiliadis , M. Polychronakis , and S. Ioannidis . You can type, but you can't hide: A stealthy GPU-based keylogger . Proceedings of the 6th European Workshop on System Security (EuroSec) , 2013 . E. Ladakis, L. Koromilas, G. Vasiliadis, M. Polychronakis, and S. Ioannidis. You can type, but you can't hide: A stealthy GPU-based keylogger. Proceedings of the 6th European Workshop on System Security (EuroSec), 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/332084.332092"},{"key":"e_1_3_2_1_14_1","volume-title":"Android Security Cookbook","author":"Makan K.","year":"2013","unstructured":"K. Makan and S. Alexander-Bown . Android Security Cookbook . Packt Publishing , 2013 . K. Makan and S. Alexander-Bown. Android Security Cookbook. Packt Publishing, 2013."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1212692"},{"key":"e_1_3_2_1_17_1","unstructured":"Nvidia. CUDA toolkit documentation v7.0. Nvidia. CUDA toolkit documentation v7.0."},{"key":"e_1_3_2_1_18_1","unstructured":"Nvidia. Using inline PTX assembly in CUDA. Nvidia. Using inline PTX assembly in CUDA."},{"key":"e_1_3_2_1_19_1","first-page":"11","article-title":"GPU powered malware. In Ruxcon, Sydney","author":"Reynaud D.","year":"2008","unstructured":"D. Reynaud . GPU powered malware. In Ruxcon, Sydney , Australia , 11 2008 . D. Reynaud. GPU powered malware. In Ruxcon, Sydney, Australia, 11 2008.","journal-title":"Australia"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093511"},{"key":"e_1_3_2_1_21_1","volume-title":"Static and dynamic reverse engineering techniques for Java software systems","author":"Syst\u00e4 T.","year":"2000","unstructured":"T. Syst\u00e4 and U. Tamperensis . Static and dynamic reverse engineering techniques for Java software systems . 2000 . T. Syst\u00e4 and U. Tamperensis. Static and dynamic reverse engineering techniques for Java software systems. 2000."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0262-9"},{"key":"e_1_3_2_1_23_1","volume-title":"Pearson Education","author":"Wilt N.","year":"2013","unstructured":"N. Wilt . The CUDA Handbook: A Comprehensive Guide to GPU Programming . Pearson Education , 2013 . N. Wilt. The CUDA Handbook: A Comprehensive Guide to GPU Programming. Pearson Education, 2013."}],"event":{"name":"SIN '16: 9th International Conference on Security of Information and Networks","acronym":"SIN '16","location":"Newark NJ USA"},"container-title":["Proceedings of the 9th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2947626.2947635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T23:58:17Z","timestamp":1673654297000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2947626.2947635"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,20]]},"references-count":23,"alternative-id":["10.1145\/2947626.2947635","10.1145\/2947626"],"URL":"https:\/\/doi.org\/10.1145\/2947626.2947635","relation":{},"subject":[],"published":{"date-parts":[[2016,7,20]]},"assertion":[{"value":"2016-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}