Search For:

Displaying 1-8 out of 8 total
A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security
Found in: IEEE Micro
By John Demme,Robert Martin,Adam Waksman,Simha Sethumadhavan
Issue Date:May 2013
pp. 68-77
User inputs tend to change the execution characteristics of applications including their interactions with cache, network, storage, and other systems. Many attacks have exploited the observable side effects of these execution characteristics to expose sens...
 
COMPASS: A Community-driven Parallelization Advisor for Sequential Software
Found in: Multicore Software Engineering, ICSE Workshop on
By Simha Sethumadhavan, Nipun Arora, Ravindra Babu Ganapathi, John Demme, Gail E. Kaiser
Issue Date:May 2009
pp. 41-48
The widespread adoption of multicores has renewed the emphasis on the use of parallelism to improve performance. The present and growing diversity in hardware architectures and software environments, however, continues to pose difficulties in the effective...
 
A reconfigurable fabric for accelerating large-scale datacenter services
Found in: 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA)
By Andrew Putnam,Adrian M. Caulfield,Eric S. Chung,Derek Chiou,Kypros Constantinides,John Demme,Hadi Esmaeilzadeh,Jeremy Fowers,Gopi Prashanth Gopal,Jan Gray,Michael Haselman,Scott Hauck,Stephen Heil,Amir Hormati,Joo-Young Kim,Sitaram Lanka,James Larus,Eric Peterson,Simon Pope,Aaron Smith,Jason Thong,Phillip Yi Xiao,Doug Burger
Issue Date:June 2014
pp. 13-24
Datacenter workloads demand high computational capabilities, flexibility, power efficiency, and low cost. It is challenging to improve all of these factors simultaneously. To advance datacenter capabilities beyond what commodity server designs can provide,...
   
On the feasibility of online malware detection with performance counters
Found in: Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA '13)
By Adam Waksman, Adrian Tang, Jared Schmitz, John Demme, Matthew Maycock, Salvatore Stolfo, Simha Sethumadhavan
Issue Date:June 2013
pp. 559-570
The proliferation of computers in any domain is followed by the proliferation of malware in that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits, spyware, adware and other classes of malware. Despite the existence o...
     
TimeWarp: rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Found in: Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA '12)
By John Demme, Robert Martin, Simha Sethumadhavan
Issue Date:June 2012
pp. 118-129
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on fixing the source of leaks either by limiting the flow of information through...
     
Side-channel vulnerability factor: a metric for measuring information leakage
Found in: Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA '12)
By Adam Waksman, John Demme, Robert Martin, Simha Sethumadhavan
Issue Date:June 2012
pp. 106-117
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. However there is currently no systematic, holistic methodology for understanding in...
     
Approximate graph clustering for program characterization
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Simha Sethumadhavan, John Demme
Issue Date:January 2012
pp. 1-21
An important aspect of system optimization research is the discovery of program traits or behaviors. In this paper, we present an automated method of program characterization which is able to examine and cluster program graphs, i.e., dynamic data graphs or...
     
Rapid identification of architectural bottlenecks via precise event counting
Found in: Proceeding of the 38th annual international symposium on Computer architecture (ISCA '11)
By John Demme, Simha Sethumadhavan
Issue Date:June 2011
pp. 353-364
On-chip performance counters play a vital role in computer architecture research due to their ability to quickly provide insights into application behaviors that are time consuming to characterize with traditional methods. The usefulness of modern performa...
     
 1