The championship simulator: Architectural simulation for education and competition
Recent years have seen a dramatic increase in the microarchitectural complexity of
processors. This increase in complexity presents a twofold challenge for the field of …
processors. This increase in complexity presents a twofold challenge for the field of …
Aqua: Scalable rowhammer mitigation by quarantining aggressor rows at runtime
Rowhammer allows an attacker to induce bit flips in a row by rapidly accessing neighboring
rows. Rowhammer is a severe security threat as it can be used to escalate privilege or break …
rows. Rowhammer is a severe security threat as it can be used to escalate privilege or break …
Moesi-prime: preventing coherence-induced hammering in commodity workloads
Prior work shows that Rowhammer attacks---which flip bits in DRAM via frequent activations
of the same row (s)---are viable. Adversaries typically mount these attacks via instruction …
of the same row (s)---are viable. Adversaries typically mount these attacks via instruction …
{CXL-ANNS}:{Software-Hardware} collaborative memory disaggregation and computation for {Billion-Scale} approximate nearest neighbor search
J Jang, H Choi, H Bae, S Lee, M Kwon… - 2023 USENIX Annual …, 2023 - usenix.org
We propose CXL-ANNS, a software-hardware collaborative approach to enable highly
scalable approximate nearest neighbor search (ANNS) services. To this end, we first …
scalable approximate nearest neighbor search (ANNS) services. To this end, we first …
Lukewarm serverless functions: characterization and optimization
Serverless computing has emerged as a widely-used paradigm for running services in the
cloud. In serverless, developers organize their applications as a set of functions, which are …
cloud. In serverless, developers organize their applications as a set of functions, which are …
Casper: Accelerating stencil computations using near-cache processing
Stencil computations are commonly used in a wide variety of scientific applications, ranging
from large-scale weather prediction to solving partial differential equations. Stencil …
from large-scale weather prediction to solving partial differential equations. Stencil …
{SecSMT}: Securing {SMT} processors against {Contention-Based} covert channels
This paper presents the first comprehensive analysis of contention-based security
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …
vulnerabilities in a high-performance simultaneous mulithreaded (SMT) processor. It …
ArchExplorer: Microarchitecture exploration via bottleneck analysis
Design space exploration (DSE) for microarchitecture parameters is an essential stage in
microprocessor design to explore the trade-offs among performance, power, and area …
microprocessor design to explore the trade-offs among performance, power, and area …
Pathfinding Future PIM Architectures by Demystifying a Commercial PIM Technology
Processing-in-memory (PIM) has been explored for decades by computer architects, yet it
has never seen the light of day in real-world products due to its high design overheads and …
has never seen the light of day in real-world products due to its high design overheads and …
PrIDE: Achieving Secure Rowhammer Mitigation with Low-Cost In-DRAM Trackers
Rowhammer-induced bit-flips are a threat to DRAM security. To mitigate Rowhammer,
DDR4 devices employ TRR, an in-DRAM tracker, to identify aggressor rows. In-DRAM …
DDR4 devices employ TRR, an in-DRAM tracker, to identify aggressor rows. In-DRAM …