Perhaps these articles will be of interest to the list:"You Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger,"
http://www.cs.columbia.edu/~mikepo/papers/gpukeylogger.eurosec13.pdf;"GPU-Assisted Malware," http://dcs.ics.forth.gr/Activities/papers/gpumalware.malware10.pdf.
↧