Zobrazeno 1 - 10
of 286
pro vyhledávání: '"Tullsen, Dean"'
This work proposes a competitive scheduling approach, designed to scale to large heterogeneous multicore systems. This scheduler overcomes the challenges of (1) the high computation overhead of near-optimal schedulers, and (2) the error introduced by
Externí odkaz:
http://arxiv.org/abs/2109.00665
Autor:
Narayan, Shravan, Disselkoen, Craig, Moghimi, Daniel, Cauligi, Sunjay, Johnson, Evan, Gang, Zhao, Vahldiek-Oberwagner, Anjo, Sahita, Ravi, Shacham, Hovav, Tullsen, Dean, Stefan, Deian
We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm) against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in-process sandbox and is, for example, used in production to isolate different clients
Externí odkaz:
http://arxiv.org/abs/2102.12730
Autor:
Vassena, Marco, Disselkoen, Craig, Gleissenthall, Klaus V., Cauligi, Sunjay, Kici, Rami Gökhan, Jhala, Ranjit, Tullsen, Dean, Stefan, Deian
We introduce BLADE, a new approach to automatically and efficiently eliminate speculative leaks from cryptographic code. BLADE is built on the insight that to stop leaks via speculation, it suffices to $\textit{cut}$ the dataflow from expressions tha
Externí odkaz:
http://arxiv.org/abs/2005.00294
Autor:
Mireshghallah, Fatemehsadat, Taram, Mohammadkazem, Jalali, Ali, Elthakeb, Ahmed Taha, Tullsen, Dean, Esmaeilzadeh, Hadi
When receiving machine learning services from the cloud, the provider does not need to receive all features; in fact, only a subset of the features are necessary for the target prediction task. Discerning this subset is the key problem of this work.
Externí odkaz:
http://arxiv.org/abs/2003.12154
Autor:
Cauligi, Sunjay, Disselkoen, Craig, Gleissenthall, Klaus v., Tullsen, Dean, Stefan, Deian, Rezk, Tamara, Barthe, Gilles
The constant-time discipline is a software-based countermeasure used for protecting high assurance cryptographic implementations against timing side-channel attacks. Constant-time is effective (it protects against many known attacks), rigorous (it ca
Externí odkaz:
http://arxiv.org/abs/1910.01755
This paper presents Packet Chasing, an attack on the network that does not require access to the network, and works regardless of the privilege level of the process receiving the packets. A spy process can easily probe and discover the exact cache lo
Externí odkaz:
http://arxiv.org/abs/1909.04841
Autor:
Mireshghallah, Fatemehsadat, Taram, Mohammadkazem, Ramrakhyani, Prakash, Tullsen, Dean, Esmaeilzadeh, Hadi
A wide variety of deep neural applications increasingly rely on the cloud to perform their compute-heavy inference. This common practice requires sending private and privileged data over the network to remote servers, exposing it to the service provi
Externí odkaz:
http://arxiv.org/abs/1905.11814
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Tullsen, Dean Michael.
Publikováno v:
Connect to this title online; UW restricted.
Thesis (Ph. D.)--University of Washington, 1996.
Vita. Includes bibliographical references (p. [93]-99).
Vita. Includes bibliographical references (p. [93]-99).
Externí odkaz:
http://hdl.handle.net/1773/6921
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.