A closer look at spatiotemporal convolutions for action recognition

D Tran, H Wang, L Torresani, J Ray… - Proceedings of the …, 2018 - openaccess.thecvf.com
In this paper we discuss several forms of spatiotemporal convolutions for video analysis and
study their effects on action recognition. Our motivation stems from the observation that 2D …

Caladan: Mitigating interference at microsecond timescales

J Fried, Z Ruan, A Ousterhout, A Belay - 14th USENIX Symposium on …, 2020 - usenix.org
The conventional wisdom is that CPU resources such as cores, caches, and memory
bandwidth must be partitioned to achieve performance isolation between tasks. Both the …

Fusion++: Volumetric object-level slam

J McCormac, R Clark, M Bloesch… - … conference on 3D …, 2018 - ieeexplore.ieee.org
We propose an online object-level SLAM system which builds a persistent and accurate 3D
graph map of arbitrary reconstructed objects. As an RGB-D camera browses a cluttered …

DAWG: A defense against cache timing attacks in speculative execution processors

V Kiriansky, I Lebedev, S Amarasinghe… - 2018 51st Annual …, 2018 - ieeexplore.ieee.org
Software side channel attacks have become a serious concern with the recent rash of
attacks on speculative processor architectures. Most attacks that have been demonstrated …

Architectural implications of function-as-a-service computing

M Shahrad, J Balkind, D Wentzlaff - … of the 52nd annual IEEE/ACM …, 2019 - dl.acm.org
Serverless computing is a rapidly growing cloud application model, popularized by
Amazon's Lambda platform. Serverless cloud services provide fine-grained provisioning of …

A survey of techniques for cache partitioning in multicore processors

S Mittal - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
As the number of on-chip cores and memory demands of applications increase, judicious
management of cache resources has become not merely attractive but imperative. Cache …

Mi6: Secure enclaves in a speculative out-of-order processor

T Bourgeat, I Lebedev, A Wright, S Zhang… - Proceedings of the …, 2019 - dl.acm.org
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …

Edge security: Challenges and issues

X Jin, C Katsis, F Sang, J Sun, A Kundu… - arXiv preprint arXiv …, 2022 - arxiv.org
Edge computing is a paradigm that shifts data processing services to the network edge,
where data are generated. While such an architecture provides faster processing and …

Nethammer: Inducing rowhammer faults through network requests

M Lipp, M Schwarz, L Raab, L Lamster… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
In this paper, we present Nethammer, a remote Rowhammer attack without a single attacker-
controlled line of code on the targeted system, ie, not even JavaScript. Nethammer works on …

KPart: A hybrid cache partitioning-sharing technique for commodity multicores

N El-Sayed, A Mukkara, PA Tsai… - … Symposium on High …, 2018 - ieeexplore.ieee.org
Cache partitioning is now available in commercial hardware. In theory, software can
leverage cache partitioning to use the last-level cache better and improve performance. In …