GPU Encrypt: AES Encryption on Mobile Devices

Cell phones have evolved into a ubiquitous and essential method of communication across the world. Smartphones and mobile devices have significantly increased the productivity of users through accessibility to important services and have thus become critically integrated into both their work and personal lives [1]. A side effect of this integration is that phones contain a large volume of probative information linked to an individual. The scope of information sensitivity ranges anywhere from low severity (call history, contact information, and text message data) to more valuable information (e-mail, browser history, chat logs, and even passwords) [2]. The ever increasing number of phones available and in use by the public will continue to enhance the convenience of day-to-day life, but simultaneously brings along an increased potential for criminals to misuse this technology.

[1]  Yi Yang,et al.  A GPGPU compiler for memory optimization and parallelism management , 2010, PLDI '10.

[2]  Gary C. Kessler,et al.  Android forensics: Simplifying cell phone examinations , 2010 .

[3]  Yang Tang,et al.  CleanOS: Limiting Mobile Data Exposure with Idle Eviction , 2012, OSDI.

[4]  Niels Provos,et al.  Encrypting Virtual Memory , 2000, USENIX Security Symposium.

[5]  Andreas Dewald,et al.  TRESOR Runs Encryption Securely Outside RAM , 2011, USENIX Security Symposium.

[6]  Xinxin Mei,et al.  Implementation and Analysis of AES Encryption on GPU , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.

[7]  Cristina-Loredana Duta,et al.  Accelerating Encryption Algorithms Using Parallelism , 2013, 2013 19th International Conference on Control Systems and Computer Science.

[8]  Takakazu Kurokawa,et al.  AES Encryption Implementation on CUDA GPU and Its Analysis , 2010, 2010 First International Conference on Networking and Computing.

[9]  Dan Boneh,et al.  Architectural Support For Copy And Tamper-Resistant Software PhD Thesis , 2003 .

[10]  Ariel J. Feldman,et al.  Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.

[11]  Kiran Kumar Matam,et al.  CPU and/or GPU: Revisiting the GPU Vs. CPU Myth , 2013, ArXiv.

[12]  Peter A. H. Peterson,et al.  Cryptkeeper: Improving security with encrypted RAM , 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST).

[13]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[14]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.