Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Khan, Sharjeel"'
Autor:
Mukherjee, Mandovi, Mao, Xiangyu, Rahman, Nael, DeLude, Coleman, Driscoll, Joe, Sharma, Sudarshan, Behnam, Payman, Kamal, Uday, Woo, Jongseok, Kim, Daehyun, Khan, Sharjeel, Tong, Jianming, Seo, Jamin, Sinha, Prachi, Swaminathan, Madhavan, Krishna, Tushar, Pande, Santosh, Romberg, Justin, Mukhopadhyay, Saibal
A near memory hardware accelerator, based on a novel direct path computational model, for real-time emulation of radio frequency systems is demonstrated. Our evaluation of hardware performance uses both application-specific integrated circuits (ASIC)
Externí odkaz:
http://arxiv.org/abs/2406.08714
Autor:
DeLude, Coleman, Driscoll, Joe, Mukherjee, Mandovi, Rahman, Nael, Kamal, Uday, Mao, Xiangyu, Khan, Sharjeel, Sivaraman, Hariharan, Huang, Eric, McHarg, Jeffrey, Swaminathan, Madhavan, Pande, Santosh, Mukhopadhyay, Saibal, Romberg, Justin
In this paper we consider the problem of developing a computational model for emulating an RF channel. The motivation for this is that an accurate and scalable emulator has the potential to minimize the need for field testing, which is expensive, slo
Externí odkaz:
http://arxiv.org/abs/2406.08710
Quantum computers have evolved from the theoretical realm into a race to large-scale implementations. This is due to the promise of revolutionary speedups, where achieving such speedup requires designing an algorithm that harnesses the structure of a
Externí odkaz:
http://arxiv.org/abs/2404.12603
Software debloating can effectively thwart certain code reuse attacks by reducing attack surfaces to break gadget chains. Approaches based on static analysis enable a reduced set of functions reachable at a callsite for execution by leveraging static
Externí odkaz:
http://arxiv.org/abs/2404.00196
Macros are a common part of Lisp languages, and one of their most lauded features. Much research has gone into making macros both safer and more powerful resulting in developments in multiple areas, including maintaining hygiene, and typed program st
Externí odkaz:
http://arxiv.org/abs/2303.12254
Publikováno v:
In Wear 15 September 2024 554-555
Modern code reuse attacks are taking full advantage of bloated software. Attackers piece together short sequences of instructions in otherwise benign code to carry out malicious actions. Eliminating these reusable code snippets, known as gadgets, has
Externí odkaz:
http://arxiv.org/abs/2110.09557
Autor:
Mururu, Girish, Khan, Sharjeel, Chatterjee, Bodhisatwa, Chen, Chao, Porter, Chris, Gavrilovska, Ada, Pande, Santosh
Typical schedulers in multi-tenancy environments make use of reactive, feedback-oriented mechanisms based on performance counters to avoid resource contention but suffer from detection lag and loss of performance. In this paper, we address these limi
Externí odkaz:
http://arxiv.org/abs/2103.06647
With a growing number of cores in modern high-performance servers, effective sharing of the last level cache (LLC) is more critical than ever. The primary agenda of such systems is to maximize performance by efficiently supporting multi-tenancy of di
Externí odkaz:
http://arxiv.org/abs/2102.09673
Side channel attacks steal secret keys by cleverly leveraging information leakages and can, therefore, break encryption. Thus, detection and mitigation of side channel attacks is a very important problem, but the solutions proposed in the literature
Externí odkaz:
http://arxiv.org/abs/2003.03850