Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Rendered insecure: GPU side channel attacks are practical
Graphics Processing Units (GPUs) are commonly integrated with computing devices to
enhance the performance and capabilities of graphical workloads. In addition, they are …
enhance the performance and capabilities of graphical workloads. In addition, they are …
Leaky dnn: Stealing deep-learning model secret with gpu context-switching side-channel
Machine learning has been attracting strong interests in recent years. Numerous companies
have invested great efforts and resources to develop customized deep-learning models …
have invested great efforts and resources to develop customized deep-learning models …
Grand pwning unit: Accelerating microarchitectural attacks with the GPU
Dark silicon is pushing processor vendors to add more specialized units such as
accelerators to commodity processor chips. Unfortunately this is done without enough care …
accelerators to commodity processor chips. Unfortunately this is done without enough care …
Microarchitectural attacks in heterogeneous systems: A survey
With the increasing proliferation of hardware accelerators and the predicted continued
increase in the heterogeneity of future computing systems, it is necessary to understand the …
increase in the heterogeneity of future computing systems, it is necessary to understand the …
Visor:{Privacy-Preserving} video analytics as a cloud service
Video-analytics-as-a-service is becoming an important offering for cloud providers. A key
concern in such services is privacy of the videos being analyzed. While trusted execution …
concern in such services is privacy of the videos being analyzed. While trusted execution …
Speccfi: Mitigating spectre attacks using cfi informed speculation
Spectre attacks and their many subsequent variants are a new vulnerability class affecting
modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by …
modern CPUs. The attacks rely on the ability to misguide speculative execution, generally by …
A Review on Network Covert Channel Construction and Attack Detection
MA Khadse, DM Dakhane - Concurrency and Computation …, 2025 - Wiley Online Library
ABSTRACT A covert network channel is a communication channel in which the message is
secretly transmitted to the recipient. Sometimes, covert network channels are vulnerable to …
secretly transmitted to the recipient. Sometimes, covert network channels are vulnerable to …
T unne L s for B ootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG
Recent studies have revealed much detailed information about the translation lookaside
buffers (TLBs) of modern CPUs, but we find that many properties of such components in …
buffers (TLBs) of modern CPUs, but we find that many properties of such components in …
{SecSMT}: Securing {SMT} processors against {Contention-Based} covert channels
This paper presents the first comprehensive analysis of contention-based security
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …
Graphics pee** unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors
As the popularity of graphics processing units (GPUs) grows rapidly in recent years, it
becomes very critical to study and understand the security implications imposed by them. In …
becomes very critical to study and understand the security implications imposed by them. In …