Abstract: In the last decade, an increasing number of processor vulnerabilities have been disclosed. However, existing methods have not tested the integrity and security of the GPU instruction set and ...