Filters








14,868 Hits in 4.9 sec

Fast and practical instruction-set randomization for commodity systems

Georgios Portokalidis, Angelos D. Keromytis
2010 Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10  
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks.  ...  This paper presents a fast and practical implementation of ISR that can be applied on currently deployed software.  ...  Opinions, findings, conclusions and recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the US Government, the Air Force, or the NSF.  ... 
doi:10.1145/1920261.1920268 dblp:conf/acsac/PortokalidisK10 fatcat:taxxxzmfqjh3fgpa6ejaiv73me

Fully Programmable Memory BIST for Commodity DRAMs

Ilwoong Kim, Woosik Jeong, Dongho Kang, Sungho Kang
2015 ETRI Journal  
For maximum programmability and small area overhead, the proposed BIST receives test algorithms from the external ATE and stores them as a unique set of instructions, as well as test sequences of unique  ...  The proposed memory BIST is a practical test solution for reducing the overall test cost for the mass production of commodity DDRx SDRAMs. Keywords¾ Built-in self-test, DRAM, low cost, at-speed test.  ...  Subsequently, a series of instructions are able to be executed with fast internal clocks. Fig. 2 shows the bit fields for a sequence buffer and an instruction buffer.  ... 
doi:10.4218/etrij.15.0115.0040 fatcat:jog3znu7qvgrjfx22m6txa6nwi

Specialized Evolution of the General Purpose CPU

Ravi Rajwar, Martin G. Dixon, Ronak Singhal
2015 Conference on Innovative Data Systems Research  
Commodity general-purpose CPUs remain the predominant computing platform for servers.  ...  Specialization includes support for floating-point and vectors, compression, encryption, and synchronization and threading.  ...  Other instructions in this realm have become important. In response to the need for more ephemeral keys, the CPU introduced a direct access to a digital random number generator instruction (RDRAND).  ... 
dblp:conf/cidr/RajwarDS15 fatcat:d2ravzkq5jc7tgb2vtotosejlu

Breaking Kernel Address Space Layout Randomization with Intel TSX

Yeongjin Jang, Sangho Lee, Taesoo Kim
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
Among various hardening techniques, Kernel Address Space Layout Randomization (KASLR) is the most effective and widely adopted defense mechanism that can practically mitigate various memory corruption  ...  In addition to its surprising accuracy and precision, DrK is universally applicable to all OSes, even in virtualized environments, and generates no visible footprint, making it difficult to detect in practice  ...  Acknowledgments We thank the anonymous reviewers, for their helpful feedback, as well as GTISC lab members for their proofreading efforts.  ... 
doi:10.1145/2976749.2978321 dblp:conf/ccs/JangLK16 fatcat:rbkxpk7mbbarjaoey33pxj7bwe

Accelerating SLIDE Deep Learning on Modern CPUs: Vectorization, Quantizations, Memory Optimizations, and More [article]

Shabnam Daghaghi, Nicholas Meisburger, Mengnan Zhao, Yong Wu, Sameh Gobriel, Charlie Tai, Anshumali Shrivastava
2021 arXiv   pre-print
Our work highlights several novel perspectives and opportunities for implementing randomized algorithms for deep learning on modern CPUs.  ...  Enhanced AI capabilities on commodity x86 architectures are commercially appealing due to the reuse of existing hardware and virtualization ease. A notable work in this direction is the SLIDE system.  ...  ACKNOWLEDGEMENTS This work was supported by National Science Foundation IIS-1652131, BIGDATA-1838177, AFOSR-YIP FA9550-18-1-0152, ONR DURIP Grant, and the ONR BRC grant on Randomized Numerical Linear Algebra  ... 
arXiv:2103.10891v1 fatcat:kvi4fszq4vampgsztwo52omc34

SwordFight

Zengbin Zhang, David Chu, Xiaomeng Chen, Thomas Moscibroda
2012 Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12  
Our implementation runs on commodity smartphones and does not require any external infrastructure.  ...  Such Phone-to-Phone Mobile Motion Games (MMG) represent interesting and novel gameplay for ad hoc users in the same location.  ...  ACKNOWLEDGEMENTS We extend our thanks to our shepherd Monica Lam and the anonymous reviewers for their feedback and suggestions.  ... 
doi:10.1145/2307636.2307638 dblp:conf/mobisys/ZhangCCM12 fatcat:4aasz65z4rhhfp2ryzysfxsuiq

CARMA

Amit Vasudevan, Jonathan McCune, James Newsome, Adrian Perrig, Leendert van Doorn
2012 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12  
We describe the design and implementation of an isolated execution environment on commodity x86 platforms that only relies on the CPU, without needing to trust the memory, buses, peripherals, or any other  ...  Much effort has been spent to reduce the software Trusted Computing Base (TCB) of modern systems. However, the hardware TCB remains complex and untrustworthy.  ...  lookaside buffer (TLB) used to speed up virtual-to-physical address translation for both executable instructions and data.  ... 
doi:10.1145/2414456.2414484 dblp:conf/ccs/VasudevanMNPD12 fatcat:f4ucctfvlnhiboziarimsbvkai

A rest stop on the unending road to provable security

2021 Research Features  
Our system specifications are those of a concrete Word Random Access Machine (cWRAM) model -the closest computation model to a real system with a large instruction set.  ...  Preliminary measurements show that randomizedpolynomial performance is practical on commodity hardware even for very large k.  ...  ACKNOWLEDGMENT Comments received from Pompiliu Donescu, Bryan Parno, Adrian Perrig, Vyas Sekar, Gene Tsudik, Osman Yagan, and Jun Zhao helped improve the clarity of this paper substantially.  ... 
doi:10.26904/rf-137-1595702835 fatcat:jzaldtktbrdenau6gxzvneiicq

AI Programmer: Autonomously Creating Software Programs Using Genetic Algorithms [article]

Kory Becker, Justin Gottschlich
2017 arXiv   pre-print
Part of AI Programmer's novelty stems from (i) its unique system design, including an embedded, hand-crafted interpreter for efficiency and security and (ii) its augmentation of GAs to include instruction-gene  ...  randomization bindings and programming language-specific genome construction and elimination techniques.  ...  optimized interpreter for fast execution and fast-failure of defunct programs.  ... 
arXiv:1709.05703v1 fatcat:a3kage5vd5ae7lgxsnf4h254ua

Lightweight capability domains

Charles Jacobsen, Muktesh Khole, Sarah Spall, Scotty Bauer, Anton Burtsev
2015 Proceedings of the 8th Workshop on Programming Languages and Operating Systems - PLOS '15  
Despite a number of radical changes in how computer systems are used, the design principles behind the very core of the systems stack-an operating system kernel-has remained unchanged for decades.  ...  Our work on lightweight capability domains (LCDs) develops principles, mechanisms, and tools that enable incremental, practical decomposition of a modern operating system kernel.  ...  Acknowledgments We thank Weibin Sun, Jon Rafkind, and the anonymous PLOS reviewers.  ... 
doi:10.1145/2818302.2818307 dblp:conf/sosp/JacobsenKSBB15 fatcat:wxl2ied63rfatg6oazr7ozh7aa

Hunger increases delay discounting of food and non-food rewards

Jordan Skrynka, Benjamin T. Vincent
2019 Psychonomic Bulletin & Review  
The results provide evidence that in the face of hunger, our valuation systems increase discounting for commodities, which cannot achieve a desired state change as well as for those commodities that can  ...  We outline and quantitatively evaluate six possible models of how our valuation systems modulate discounting of various commodities in the face of the undesirable state of being hungry.  ...  Acknowledgements The authors thank Blair Saunders, Gillian Pepper, and Caroline Allen for helpful feedback on a draft of this paper, and to Catherine Cross and Carolina Kuepper-Tetzel for useful discussions  ... 
doi:10.3758/s13423-019-01655-0 pmid:31520252 pmcid:PMC6797630 fatcat:ejaifueeafd2nfdou2nzgfvpw4

Parallelized Progressive Network Coding With Hardware Acceleration

Hassan Shojania, Baochun Li
2007 IEEE International Workshop on Quality of Service, IWQoS  
We then employ hardware acceleration with SSE2 and AltiVec SIMD vector instructions on x86 and PowerPC processors, respectively.  ...  We then use a careful threading design to take advantage of symmetric multiprocessor (SMP) systems and multicore processors.  ...  To summarize, while there is no doubt that more efficient codes exist, they may not be suitable for randomized network coding in a practical setting.  ... 
doi:10.1109/iwqos.2007.376547 dblp:conf/iwqos/ShojaniaL07 fatcat:pqbydjynjfes7phjbwxpufqw2u

BodyDigitizer: An Open Source Photogrammetry-based 3D Body Scanner [article]

Travis Gesslein, Daniel Scherer, Jens Grubert
2017 arXiv   pre-print
We present an open-source project, BodyDigitizer, which aims at providing both build instructions and configuration software for a high-resolution photogrammetry-based 3D body scanner.  ...  The detailed build instruction and software are available at http://www.bodydigitizer.org.  ...  Immediately after the first picture, a random dot pattern is projected onto the user and a second image is taken to allow for surface reconstruction.  ... 
arXiv:1710.01370v2 fatcat:gmn622by7bfhxoqzpstaeohwny

Ray Tracing on the Cell Processor

Carsten Benthin, Ingo Wald, Michael Scherbaum, Heiko Friedrich
2006 2006 IEEE Symposium on Interactive Ray Tracing  
Today, the resulting power consumption and heat dissipation threaten to end this trend, and CPU designers are looking for alternative ways of providing more compute power.  ...  Cell a pure ray tracing performance of nearly one order of magnitude over that achieved by a commodity CPU.  ...  and Barry Minor for their helpful support.  ... 
doi:10.1109/rt.2006.280210 fatcat:h5vxjmznb5fg3h6du7wbfs4bty

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels [chapter]

Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi Rabhi
2018 Lecture Notes in Computer Science  
In this paper, we propose a reliable and practical system, named KASR, which transparently reduces attack surfaces of commodity OS kernels at runtime without requiring their source code.  ...  For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is used.  ...  In summary, we make the following contributions: • Propose a new approach to reliably and practically reduce the attack surfaces of commodity OS kernels. • Design and implement a practical KASR system  ... 
doi:10.1007/978-3-030-00470-5_32 fatcat:vyoq5aadonan3ofrytznckmylq
« Previous Showing results 1 — 15 out of 14,868 results