Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Silberstein, Mark"'
Autor:
Elimelech, Rotem, David, Ofir, Mengual, Carlos De la Cruz, Kalisch, Rotem, Berndt, Wolfgang, Shalyt, Michael, Silberstein, Mark, Hadad, Yaron, Kaminer, Ido
Publikováno v:
PNAS 121 (25) e2321440121 (2024)
In recent decades, a growing number of discoveries in fields of mathematics have been assisted by computer algorithms, primarily for exploring large parameter spaces that humans would take too long to investigate. As computers and algorithms become m
Externí odkaz:
http://arxiv.org/abs/2308.11829
Attacks like Spectre abuse speculative execution, one of the key performance optimizations of modern CPUs. Recently, several testing tools have emerged to automatically detect speculative leaks in commercial (black-box) CPUs. However, the testing pro
Externí odkaz:
http://arxiv.org/abs/2301.07642
Autor:
Orenbach, Meni, Raveh, Bar, Berkenstadt, Alon, Michalevsky, Yan, Itzhaky, Shachar, Silberstein, Mark
Applications running in Trusted Execution Environments (TEEs) commonly use untrusted external services such as host File System. Adversaries may maliciously alter the normal service behavior to trigger subtle application bugs that would have never oc
Externí odkaz:
http://arxiv.org/abs/2211.07185
Autor:
Dimitsas, Vasilis, Silberstein, Mark
GPUs are broadly used in I/O-intensive big data applications. Prior works demonstrate the benefits of using GPU-side file system layer, GPUfs, to improve the GPU performance and programmability in such workloads. However, GPUfs fails to provide high
Externí odkaz:
http://arxiv.org/abs/2109.05366
Speculative vulnerabilities such as Spectre and Meltdown expose speculative execution state that can be exploited to leak information across security domains via side-channels. Such vulnerabilities often stay undetected for a long time as we lack the
Externí odkaz:
http://arxiv.org/abs/2105.06872
Multi-field packet classification is a crucial component in modern software-defined data center networks. To achieve high throughput and low latency, state-of-the-art algorithms strive to fit the rule lookup data structures into on-die caches; howeve
Externí odkaz:
http://arxiv.org/abs/2002.07584
SpecFuzz is the first tool that enables dynamic testing for speculative execution vulnerabilities (e.g., Spectre). The key is a novel concept of speculation exposure: The program is instrumented to simulate speculative execution in software by forcef
Externí odkaz:
http://arxiv.org/abs/1905.10311
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
A recent discovery of a new class of microarchitectural attacks called Spectre picked up the attention of the security community as these attacks can circumvent many traditional mechanisms of defense. One of the attacks---Bounds Check Bypass---can ne
Externí odkaz:
http://arxiv.org/abs/1805.08506
We propose a novel technique for faster deep neural network training which systematically applies sample-based approximation to the constituent tensor operations, i.e., matrix multiplications and convolutions. We introduce new sampling techniques, st
Externí odkaz:
http://arxiv.org/abs/1805.08079