Security researchers found a way to manipulate GPU memory and elevate it into a system attack with root permissions.
Abstract: In secure, resource-constrained environments there are new challenges viewed due to the impact of Internet of Things (IoT) on data-oriented applications. Owing to physical constraints such ...