A pythonic approach for rapid hardware prototy** and instrumentation
We introduce PyRTL, a Python embedded hardware design language that helps concisely
and precisely describe digital hardware structures. Rather than attempt to infer a good …
and precisely describe digital hardware structures. Rather than attempt to infer a good …
CHEx86: Context-sensitive enforcement of memory safety via microcode-enabled capabilities
This work introduces the CHEx86 processor architecture for securing applications, including
legacy binaries, against a wide array of security exploits that target temporal and spatial …
legacy binaries, against a wide array of security exploits that target temporal and spatial …
Structured Combinators for Efficient Graph Reduction
C Accetti, R Ying, P Liu - IEEE Computer Architecture Letters, 2022 - ieeexplore.ieee.org
Combinators have a long history in mathematics, logic and computer science, as simple
primitive symbols with which complex relationships can be described. In practice, this …
primitive symbols with which complex relationships can be described. In practice, this …
A platform for full-stack functional programming
CARA Melo, P Liu, R Ying - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Traditional CPU design shows signs of fatigue, expressed as overwhelming security
vulnerabilities. As we investigate functional programming as an alternative to the insecure …
vulnerabilities. As we investigate functional programming as an alternative to the insecure …
Bouncer: Static program analysis in hardware
When discussing safety and security for embedded systems, we typically divide the world
into software checks (which are either static or dynamic) or hardware checks (which are …
into software checks (which are either static or dynamic) or hardware checks (which are …
Architectural Support for Functional Programming
C Accetti, P Liu - 2022 IFIP/IEEE 30th International Conference …, 2022 - ieeexplore.ieee.org
The architecture of a computer determines what programs are allowed to do and what the
microarchitecture should implement. As security and safety become critical needs for an …
microarchitecture should implement. As security and safety become critical needs for an …
Safe functional systems through integrity types and verified assembly
Building a trustworthy life-critical embedded system requires deep reasoning about the
potential effects that sequences of machine instructions can have on full system operation …
potential effects that sequences of machine instructions can have on full system operation …
[BOOK][B] The ZARF Architecture for Recursive Functions
JE McMahan - 2019 - search.proquest.com
For highly critical workloads, the legitimate fear of catastrophic failure leads to both highly
conservative design practices and excessive assurance costs. One import part of the …
conservative design practices and excessive assurance costs. One import part of the …
[BOOK][B] Programming Language Techniques for Improving ISA and HDL Design
MA Christensen - 2021 - search.proquest.com
Despite all the effort spent in testing, analyzing, and formally verifying software, a program is
ultimately only as correct as the underlying hardware on which it runs. As processors …
ultimately only as correct as the underlying hardware on which it runs. As processors …