Hardware-accelerated platforms and infrastructures for network functions: A survey of enabling technologies and research studies

P Shantharama, AS Thyagaturu, M Reisslein - IEEE Access, 2020 - ieeexplore.ieee.org
In order to facilitate flexible network service virtualization and migration, network functions
(NFs) are increasingly executed by software modules as so-called “softwarized NFs” on …

BYOC: a" bring your own core" framework for heterogeneous-ISA research

J Balkind, K Lim, M Schaffner, F Gao… - Proceedings of the …, 2020 - dl.acm.org
Heterogeneous architectures and heterogeneous-ISA designs are growing areas of
computer architecture and system software research. Unfortunately, this line of research is …

A framework for software diversification with {ISA} heterogeneity

X Wang, SM Yeoh, R Lyerly, P Olivier, SH Kim… - … on Research in Attacks …, 2020 - usenix.org
Software diversification is one of the most effective ways to defeat memory corruption based
attacks. Traditional software diversification such as code randomization techniques …

Speculative code compaction: Eliminating dead code via speculative microcode transformations

L Moody, W Qi, A Sharifi, L Berry… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
The computing landscape has been increasingly characterized by processor architectures
with increasing core counts, while a majority of the software applications remain inherently …

Energy-Efficient Exposed Datapath Architecture With a RISC-V Instruction Set Mode

K Hepola, J Multanen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Transport triggered architectures (TTAs) follow the static programming model of very long
instruction word (VLIW) processors but expose additional information of the processor …

[PDF][PDF] Ceviche: Capability-Enhanced Secure Virtualization of Caches

A Kalita, Y Yang, AK Murali… - 2025 IEEE Symposium on …, 2024 - researchgate.net
Modern systems make extensive use of resource virtualization to achieve high hardware
utilization and minimize the total cost of ownership. However, sharing of physical resources …

[PDF][PDF] Dramaqueen: Revisiting side channels in dram

V van der Veen, B Gras - 2023 - dramsec.ethz.ch
The only way to process sensitive information securely is to ensure that every aspect of the
processing is constanttime: No aspect of the execution, be it algorithm, implementation, or …

Machine learning computers with fractal von Neumann architecture

Y Zhao, Z Fan, Z Du, T Zhi, L Li, Q Guo… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Machine learning techniques are pervasive tools for emerging commercial applications and
many dedicated machine learning computers on different scales have been deployed in …

Cambricon-F: machine learning computers with fractal von Neumann architecture

Y Zhao, Z Du, Q Guo, S Liu, L Li, Z Xu, T Chen… - Proceedings of the 46th …, 2019 - dl.acm.org
Machine learning techniques are pervasive tools for emerging commercial applications and
many dedicated machine learning computers on different scales have been deployed in …

Flick: Fast and lightweight isa-crossing call for heterogeneous-isa environments

S Cho, H Chen, S Madaminov… - 2020 ACM/IEEE 47th …, 2020 - ieeexplore.ieee.org
Heterogeneous-ISA multi-core systems have performance and power consumption benefits.
Today, numerous system components, such as NVRAMs and Smart NICs, already have built …