What is it about?
This paper proves that Return-Oriented Programming (ROP) is a viable attacker primitive on Graphics Processing Units (GPUs), just like on the CPU. Previous work dismissed its expressiveness, limiting its effectiveness to simple attacks that could be achieved with other techniques. Nevertheless, we demonstrate that Turing-complete ROP chains are once again possible. Therefore, we want this paper to function as a call to arms for GPU manufacturers and developers to design comprehensive memory safety mitigations for GPUs.
Featured Image
Photo by Nana Dua on Unsplash
Why is it important?
We are the first to demonstrate that arbitrary computations are possible using ROP-based attacks on GPUs. This shows that GPUs, like CPUs decades ago, are vulnerable to many attacks and thus need comprehensive mitigations.
Read the Original
This page is a summary of: CUDA, Woulda, Shoulda: Returning Exploits in a SASS-y World, March 2025, ACM (Association for Computing Machinery),
DOI: 10.1145/3722041.3723099.
You can read the full text:
Contributors
The following have contributed to this page







