Oh you cycnic...
Infosec bods demo GPU keylogger. Don't tell the NS... oh, wait
Security researchers have demonstrated how malicious code can be run on graphics processors (GPUs) rather than the central processing unit (CPUs) at the heart of a computer. Team Jellyfish's Demon keylogger proof-of-concept code operates in a blind spot that conventional security software is simply not designed to inspect. …
COMMENTS
-
This post has been deleted by its author
-
Sunday 17th May 2015 07:15 GMT Fazal Majid
Seems far-fetched
The GPU has direct memory access but no direct connection to the keyboard, so this is likely to be heavily OS-dependent. It's also awfuly convoluted, when USB rootkits are much easier to install, and one installed in a keyboard is optimally placed to log keystrokes:
http://www.blackhat.com/presentations/bh-usa-09/CHEN/BHUSA09-Chen-RevAppleFirm-PAPER.pdf
or network card rootkits are ideally poised to exfiltrate data.