A survey of timing verification techniques for multi-core real-time systems

C Maiza, H Rihani, JM Rivas, J Goossens… - ACM Computing …, 2019 - dl.acm.org
This survey provides an overview of the scientific literature on timing verification techniques
for multi-core real-time systems. It reviews the key results in the field from its origins around …

Scalable algorithms for molecular dynamics simulations on commodity clusters

KJ Bowers, E Chow, H Xu, RO Dror… - Proceedings of the …, 2006 - dl.acm.org
Although molecular dynamics (MD) simulations of biomolecular systems often run for days to
months, many events of great scientific interest and pharmaceutical relevance occur on long …

Survey of microarchitectural side and covert channels, attacks, and defenses

J Szefer - Journal of Hardware and Systems Security, 2019 - Springer
Over the last two decades, side and covert channel research has shown a variety of ways of
exfiltrating information for a computer system. Processor microarchitectural timing-based …

[BOOK][B] Logic and computer design fundamentals

MM Mano, CR Kime - 1997 - dl.acm.org
It is probably difficult to find a text on computer architecture that will satisfy teachers of both
computer engineering and computer science. Most of the several excellent texts on …

Layered architecture for quantum computing

NC Jones, R Van Meter, AG Fowler, PL McMahon… - Physical Review X, 2012 - APS
We develop a layered quantum-computer architecture, which is a systematic framework for
tackling the individual challenges of develo** a quantum computer while constructing a …

Predicting secret keys via branch prediction

O Acıiçmez, ÇK Koç, JP Seifert - Topics in Cryptology–CT-RSA 2007: The …, 2006 - Springer
This paper announces a new software side-channel attack—enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …

Understanding replication in databases and distributed systems

M Wiesmann, F Pedone, A Schiper… - Proceedings 20th …, 2000 - ieeexplore.ieee.org
Replication is an area of interest to both distributed systems and databases. The solutions
developed from these two perspectives are conceptually similar but differ in many aspects …

Yet another microarchitectural attack: exploiting I-cache

O Aciiçmez - Proceedings of the 2007 ACM workshop on Computer …, 2007 - dl.acm.org
MicroArchitectural Attacks (MA), which can be considered as a special form of Side-Channel
Analysis, exploit microarchitectural functionalities of processor implementations and can …

Post-silicon bug localization in processors using instruction footprint recording and analysis (IFRA)

SB Park, T Hong, S Mitra - IEEE Transactions on Computer …, 2009 - ieeexplore.ieee.org
Instruction Footprint Recording and Analysis (IFRA) overcomes challenges associated with
an expensive step in post-silicon validation of processors-pinpointing the bug location and …

On the power of simple branch prediction analysis

O Aciiçmez, ÇK Koç, JP Seifert - … of the 2nd ACM symposium on …, 2007 - dl.acm.org
Very recently, a new software side-channel attack, called Branch Prediction Analysis (BPA)
attack, has been discovered and also demonstrated to be practically feasible on popular …