A survey of timing verification techniques for multi-core real-time systems
This survey provides an overview of the scientific literature on timing verification techniques
for multi-core real-time systems. It reviews the key results in the field from its origins around …
for multi-core real-time systems. It reviews the key results in the field from its origins around …
Scalable algorithms for molecular dynamics simulations on commodity clusters
Although molecular dynamics (MD) simulations of biomolecular systems often run for days to
months, many events of great scientific interest and pharmaceutical relevance occur on long …
months, many events of great scientific interest and pharmaceutical relevance occur on long …
Survey of microarchitectural side and covert channels, attacks, and defenses
J Szefer - Journal of Hardware and Systems Security, 2019 - Springer
Over the last two decades, side and covert channel research has shown a variety of ways of
exfiltrating information for a computer system. Processor microarchitectural timing-based …
exfiltrating information for a computer system. Processor microarchitectural timing-based …
[BOOK][B] Logic and computer design fundamentals
MM Mano, CR Kime - 1997 - dl.acm.org
It is probably difficult to find a text on computer architecture that will satisfy teachers of both
computer engineering and computer science. Most of the several excellent texts on …
computer engineering and computer science. Most of the several excellent texts on …
Layered architecture for quantum computing
We develop a layered quantum-computer architecture, which is a systematic framework for
tackling the individual challenges of develo** a quantum computer while constructing a …
tackling the individual challenges of develo** a quantum computer while constructing a …
Predicting secret keys via branch prediction
This paper announces a new software side-channel attack—enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …
Understanding replication in databases and distributed systems
Replication is an area of interest to both distributed systems and databases. The solutions
developed from these two perspectives are conceptually similar but differ in many aspects …
developed from these two perspectives are conceptually similar but differ in many aspects …
Yet another microarchitectural attack: exploiting I-cache
O Aciiçmez - Proceedings of the 2007 ACM workshop on Computer …, 2007 - dl.acm.org
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel
Analysis, exploit microarchitectural functionalities of processor implementations and can …
Analysis, exploit microarchitectural functionalities of processor implementations and can …
Post-silicon bug localization in processors using instruction footprint recording and analysis (IFRA)
SB Park, T Hong, S Mitra - IEEE Transactions on Computer …, 2009 - ieeexplore.ieee.org
Instruction Footprint Recording and Analysis (IFRA) overcomes challenges associated with
an expensive step in post-silicon validation of processors-pinpointing the bug location and …
an expensive step in post-silicon validation of processors-pinpointing the bug location and …
On the power of simple branch prediction analysis
Very recently, a new software side-channel attack, called Branch Prediction Analysis (BPA)
attack, has been discovered and also demonstrated to be practically feasible on popular …
attack, has been discovered and also demonstrated to be practically feasible on popular …