Secure and timely gpu execution in cyber-physical systems

J Wang, Y Wang, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems
(CPSs), frequently used to perform real-time safety-critical functions, such as object …

Program environment fuzzing

R Meng, GJ Duck, A Roychoudhury - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Computer programs are not executed in isolation, but rather interact with the execution
environment which drives the program behaviors. Software validation methods thus need to …

Minimum viable device drivers for ARM TrustZone

L Guo, FX Lin - Proceedings of the Seventeenth European Conference …, 2022 - dl.acm.org
While TrustZone can isolate IO hardware, it lacks drivers for modern IO devices. Rather than
porting drivers, we propose a novel approach to deriving minimum viable drivers …

Automated Backend Allocation for Multi-Model, On-Device AI Inference

V Iyer, S Lee, S Lee, JJ Kim, H Kim, Y Shin - Proceedings of the ACM on …, 2023 - dl.acm.org
On-Device Artificial Intelligence (AI) services such as face recognition, object tracking and
voice recognition are rapidly scaling up deployments on embedded, memory-constrained …

Safe and Practical GPU Computation in TrustZone

H Park, FX Lin - Proceedings of the Eighteenth European Conference …, 2023 - dl.acm.org
For mobile devices, it is compelling to run sensitive GPU computation within a TrustZone
trusted execution environment (TEE). To minimize GPU software deployed in TEE, the …

[PDF][PDF] ReUSB: Replay-Guided USB Driver Fuzzing.

J Jang, M Kang, D Song - USENIX Security Symposium, 2023 - usenix.org
Vulnerabilities in device drivers are constantly threatening the security of OS kernels. USB
drivers are particularly concerning due to their widespread use and the wide variety of their …

ProvCam: A Camera Module with Self-Contained TCB for Producing Verifiable Videos

Y Liu, Z Yao, M Chen, A Amiri Sani, S Agarwal… - Proceedings of the 30th …, 2024 - dl.acm.org
Our perception of reality is under constant threat from ever-improving video manipulation
techniques, including deep-fakes and generative AI. Therefore, proving authenticity of …

Securing Connected and Automated Vehicle through Proactive Vulnerability Analysis and Security Enhancement

S Hu - 2022 - deepblue.lib.umich.edu
The rapidly evolving Connected and Autonomous Vehicle (CAV) technology brings new
security challenges to vehicular systems, because newly introduced communication and …