A pythonic approach for rapid hardware prototy** and instrumentation

J Clow, G Tzimpragos, D Dangwal… - … Conference on Field …, 2017 - ieeexplore.ieee.org
We introduce PyRTL, a Python embedded hardware design language that helps concisely
and precisely describe digital hardware structures. Rather than attempt to infer a good …

CHEx86: Context-sensitive enforcement of memory safety via microcode-enabled capabilities

R Sharifi, A Venkat - 2020 ACM/IEEE 47th Annual International …, 2020 - ieeexplore.ieee.org
This work introduces the CHEx86 processor architecture for securing applications, including
legacy binaries, against a wide array of security exploits that target temporal and spatial …

Structured Combinators for Efficient Graph Reduction

C Accetti, R Ying, P Liu - IEEE Computer Architecture Letters, 2022 - ieeexplore.ieee.org
Combinators have a long history in mathematics, logic and computer science, as simple
primitive symbols with which complex relationships can be described. In practice, this …

A platform for full-stack functional programming

CARA Melo, P Liu, R Ying - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Traditional CPU design shows signs of fatigue, expressed as overwhelming security
vulnerabilities. As we investigate functional programming as an alternative to the insecure …

Bouncer: Static program analysis in hardware

J McMahan, M Christensen, K Dewey… - Proceedings of the 46th …, 2019 - dl.acm.org
When discussing safety and security for embedded systems, we typically divide the world
into software checks (which are either static or dynamic) or hardware checks (which are …

Architectural Support for Functional Programming

C Accetti, P Liu - 2022 IFIP/IEEE 30th International Conference …, 2022 - ieeexplore.ieee.org
The architecture of a computer determines what programs are allowed to do and what the
microarchitecture should implement. As security and safety become critical needs for an …

Safe functional systems through integrity types and verified assembly

M Christensen, J McMahan, L Nichols, J Roesch… - Theoretical Computer …, 2021 - Elsevier
Building a trustworthy life-critical embedded system requires deep reasoning about the
potential effects that sequences of machine instructions can have on full system operation …

[BOOK][B] The ZARF Architecture for Recursive Functions

JE McMahan - 2019 - search.proquest.com
For highly critical workloads, the legitimate fear of catastrophic failure leads to both highly
conservative design practices and excessive assurance costs. One import part of the …

[BOOK][B] Programming Language Techniques for Improving ISA and HDL Design

MA Christensen - 2021 - search.proquest.com
Despite all the effort spent in testing, analyzing, and formally verifying software, a program is
ultimately only as correct as the underlying hardware on which it runs. As processors …