User Tools

Site Tools


readings

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

readings [2020/05/28 16:16] – [Lecture 11 (21.05 Thu.)] kanellokreadings [2020/05/29 10:26] (current) – external edit 127.0.0.1
Line 50: Line 50:
  
 === S1.2 === === S1.2 ===
-  * {{http://seelab.ucsd.edu/papers/gdhiman_dac09.pdf| Gaurav Dhiman, Raid Ayoub, Tajana Rosing, "PDRAM: A Hybrid PRAM and DRAM Main Memory System", DAC 2009}}+  * [[http://seelab.ucsd.edu/papers/gdhiman_dac09.pdf| Gaurav Dhiman, Raid Ayoub, Tajana Rosing, "PDRAM: A Hybrid PRAM and DRAM Main Memory System", DAC 2009]] 
 +  * {{2976742.pdf| Arvind Kumar, Zhe  Wan Zhe Wan, Winfried W Wilcke, Winfried W. Wilcke, Subramanian S Iyer, Subramanian S. Iyer, "Toward Human-Scale Brain Computing Using 3D Wafer Scale Integration", ACM Journal on Emerging Technologies in Computing Systems 2017}} 
 +  * {{08327030.pdf | Saptadeep Pal, Daniel Petrisko, Adeel A. Bajwa, Puneet Gupta, Subramanian S. Iyer, Rakesh Kumar, "A Case for Packageless Processors", 2018 IEEE International Symposium on High Performance Computer Architecture}}
  
  
Line 66: Line 68:
        
    === S2.2  ===    === S2.2  ===
-   * {{ https://dl.acm.org/doi/10.1145/223982.224449 +   * {{ smt.pdf 
 Dean M. Tullsen, Susan J. Eggers, Henry M. Levy "Simultaneous multithreading: maximizing on-chip parallelism", ISCA 1995 }} Dean M. Tullsen, Susan J. Eggers, Henry M. Levy "Simultaneous multithreading: maximizing on-chip parallelism", ISCA 1995 }}
-   * {{ https://dl.acm.org/doi/10.1145/232974.232993 | Dean M. Tullsen, S. Eggers ,Joel S. Emer, Henry M Levy, Jack Lee Jay Lo, Rebecca L Stamm+   * {{ exp_choice.pdf | Dean M. Tullsen, S. Eggers ,Joel S. Emer, Henry M Levy, Jack Lee Jay Lo, Rebecca L Stamm
 "Exploiting choice: instruction fetch and issue on an implementable simultaneous multithreading processor", ISCA 1996}} "Exploiting choice: instruction fetch and issue on an implementable simultaneous multithreading processor", ISCA 1996}}
-   * {{ https://dl.acm.org/doi/10.1145/146628.1397103 +   * {{ elem.pdf 
 Hiroaki  Hirata, Kozo  Kimura, Satoshi  Nagamine, Yoshiyuki  Mochizuki, Akio  Nishimura, Yoshimori  Nakase, Teiji  Nishizawa  Hiroaki  Hirata, Kozo  Kimura, Satoshi  Nagamine, Yoshiyuki  Mochizuki, Akio  Nishimura, Yoshimori  Nakase, Teiji  Nishizawa 
 "An elementary processor architecture with simultaneous instruction issuing from multiple threads", ISCA 1992}}  "An elementary processor architecture with simultaneous instruction issuing from multiple threads", ISCA 1992}} 
Line 181: Line 183:
  
    *{{ https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-lipp.pdf | Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, "Meltdown: Reading Kernel Memory from User Space", USENIX Security 2018 }}    *{{ https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-lipp.pdf | Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, "Meltdown: Reading Kernel Memory from User Space", USENIX Security 2018 }}
 +   *{{ https:// www.usenix.org/ system/ files/ conference/ usenixsecurity18/ sec18-van_bulck.pdf | Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx, " Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution", USENIX Security 2018 }}
 +   *{{ https://www.cs.utexas.edu/users/witchel/pubs/hunt16osdi-ryoan.pdf | Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel ,"Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data", OSDI 2016}}
 +   *{{ http://www.pbwcz.cz/Papers%20II/SgxPectre.pdf | Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai, "SGXPECTREAttacks: Leaking Enclave Secrets via Speculative Execution", arXiv 2018}}
 +
  
 === S8.2 === === S8.2 ===
 === Discussed Papers === === Discussed Papers ===
 +
 +   *{{ https://courses.cs.ut.ee/MTAT.07.022/2013_fall/uploads/Main/tiit-report | Georg T. Becker, Francesco Regazzoni, Christof Paar,and Wayne P. Burleson,"Stealthy Dopant-Level Hardware Trojans", CHES 2013}}
 +   *{{ https://www.iacr.org/archive/ches2009/57470383/57470383.pdf | Lang Lin, Markus Kasper, Tim G ̈uneysu,Christof Paar†, and Wayne Burleson, "Trojan Side-Channels: Lightweight HardwareTrojans through Side-Channel Engineering", CHES 2009}}
  
 ===== Lecture 12 (28.05 Thu.) ===== ===== Lecture 12 (28.05 Thu.) =====
Line 212: Line 221:
  
 === Related Papers === === Related Papers ===
-  * [[ https://people.inf.ethz.ch/omutlu/pub/Revisiting-RowHammer_isca20.pdf| Jeremie S. Kim, Minesh Patel, A. Giray Yağlıkçı, Hasan Hassan, Roknoddin Azizi, Lois Orosa, Onur Mutlu, "Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques", ISCA 2020]]+  * [[ https://people.inf.ethz.ch/omutlu/pub/Revisiting-RowHammer_isca20.pdf| Jeremie S. Kim, Minesh Patel, A. Giray Yağlıkçı, Hasan Hassan, Roknoddin Azizi, Lois Orosa, Onur Mutlu, "Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques", ISCA 2020]]  
 +  * [[ https://people.inf.ethz.ch/omutlu/pub/rowhammer-vulnerability-testing-methodology-for-cloud_ieee_security_privacy20.pdf | Lucian Cojocar, Jeremie Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, and Onur Mutlu, "Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers", Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2020.]] 
 +  * [[ https://people.inf.ethz.ch/omutlu/pub/rowhammer-TRRespass_ieee_security_privacy20.pdf | Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi, "TRRespass: Exploiting the Many Sides of Target Row Refresh", Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May 2020.]]  
 +  * [[ https://cseweb.ucsd.edu/~savage/papers/CCS09.pdf| Ristenpart, Thomas, Eran Tromer, Hovav Shacham, and Stefan Savage. "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds." In Proceedings of the 16th ACM conference on Computer and communications security, pp. 199-212. 2009.]]
readings.1590682566.txt.gz · Last modified: 2020/05/28 16:16 by kanellok