A more recent version, which appeared at ACSAC in December 2007 can be
found at:
http://www1.cs.columbia.edu/~angelos/Papers/2007/SSARES_ACSAC.pdf
Since then, the student primarily working on this(*) has improved
performance to the point of being able to search a couple of email
messages p
There was a paper in IEEE Security & Privacy 2006 by Sam King on how
to do this kind of attack (his system was called SubVirt):
http://www.eecs.umich.edu/virtual/papers/king06.pdf
However, in practice it turns out this is a much harder than people
think. See Tal Garfinkel's paper on p
Actually, there's a slightly earlier paper:
"CryptoGraphics: Secret Key Cryptography Using Graphics Cards"
Debra L. Cook, John Ioannidis, Angelos D. Keromytis, and Jake Luck. In
Proceedings of the RSA Conference, Cryptographer's Track (CT-RSA), pp.
334 - 350. February 200
WWW2006 Refereed Track: Security, privacy & Ethics
Viruses, spyware, and identity theft are turning the World Wide Web into
a dangerous place. By undermining consumer trust, these problems are
hampering e-commerce and the growth of online communities. A basic
lesson is coming home to researche