SHA-256 plays an important role in widely used applications, such as data security, data integrity, digital signatures, and cryptocurrencies. However, most of the current optimized implementations of SHA-256 are based...
详细信息
Multi-parallel grid-connected inverter system is increasingly applied in distributed power generation systems. Due to the existence of grid impedance, the output current of the grid-connected inverter cannot be fed to...
详细信息
An Ad-Hoc File System dynamically virtualizes storage on compute nodes into a fast storage volume to reduce congestion on parallel file systems used as backends in HPC environments and improve data locality. This pape...
详细信息
Isolation is a critical mechanism for enhancing the security of computer systems. By controlling the access privileges of software and hardware resources, isolation mechanisms can decouple software into multiple isola...
详细信息
ISBN:
(纸本)9798400700958
Isolation is a critical mechanism for enhancing the security of computer systems. By controlling the access privileges of software and hardware resources, isolation mechanisms can decouple software into multiple isolated components and enforce the principle of least privilege. While existing isolation systems primarily focus on memory isolation, they overlook the isolation of instruction and register resources, which we refer to as ISA (Instruction Set Architecture) resources. However, previous works have shown that exploiting ISA resources can lead to serious security problems, such as breaking the system's memory isolation property by abusing x86's CR3 register. Furthermore, existing hardware only provides privilege-level-based access control for ISA resources, which is too coarse-grained for software decoupling. For example, ARM Cortex A53 has several hundred system instructions/registers, but only four exception levels (EL0 to EL3) are provided. Additionally, more than 100 instructions/registers for system control are available in only EL1 (the kernel mode). To address this problem, this paper proposes ISA-Grid, an architecture of fine-grained privilege control for instructions and registers. ISA-Grid is a hardware extension that enables the creation of multiple ISA domains, with each domain having different privileges to access instructions and registers. The ISA domain can provide bit-level fine-grained privilege control for registers. We implemented prototypes of ISA-Grid based on two different CPU cores: 1) a RISC-V CPU core on an FPGA board and 2) an x86 CPU core on a simulator. We applied ISA-Grid to different cases, including Linux kernel decomposition and enhancing existing security systems, to demonstrate how ISA-Grid can isolate ISA resources and mitigate attacks based on abusing them. The performance evaluation results on both x86 and RISC-V platforms with real-world applications showed that ISA-Grid has negligible runtime overhead (less than 1%).
The proceedings contain 42 papers. The special focus in this conference is on Joint international Conference of the internationalsymposium on Science of Mechanisms and Machines and international Conference on Robotic...
ISBN:
(纸本)9783031256547
The proceedings contain 42 papers. The special focus in this conference is on Joint international Conference of the internationalsymposium on Science of Mechanisms and Machines and international Conference on Robotics. The topics include: Study of Vibrations of a Cantilever Beam with Uniformly distributed Mass;considerations on the Proper Selection of Sensors for Vibroacoustic Study of the Vehicles;experimental Identification of Singularities in parallel Manipulators;requirements and Problems for Space Berthing System;A Kinematic Analysis of the TORVEastro Astronaut Robot Arm;Evaluation by Numerical Simulation of Friction Forces in Spherical Joints of a 6-DOF parallel Topology Robot;comparative Analysis of Four Solutions for Command and Control Applied to Anthropomorphic Grippers for Robots;Model-Free Reaching of a 2-DOF Robotic Arm Using Neural Networks;inverse Dynamic Modeling of a parallel Robot for Lower Limb Rehabilitation;a Study of Feasibility of a Mechanism for Rib-Vertebra-Sternum Prosthesis;kinematic and Dynamic Analysis of an Exoskeleton Robotic System;design and Operation of a Cable-Driven Robot for Lower-Limb Rehabilitation;a State of Art Overwiew on Wrist Rehabilitation Exoskeletons;design of an Exoskeleton for Rehabilitation Ankle Joint;requirements and Characteristics of Finger Motion Assistance;development of a Force Feedback Control for Robotic Assisted Liver Cancer Treatment;Perspectives on Originally Designed Eco-Friendly Robotic Cell for PCB Dismantling;cloud-Based Digital Twin for Robot Health Monitoring and Integration in Cyber-Physical Production systems;a Novel Design of a Robotic System for Biological Fluid Aliquoting;multimodal Perceptual Cues for Context-Aware Human-Robot Interaction;a Review on Mechanisms Used for the Reconfigurable Wheelchairs.
Reproducibility in computer science is often seen as a difficult to impossible task requiring bespoke hardware and software that others simply cannot field. Because of this, alternative approaches to reproducibility f...
详细信息
ISBN:
(纸本)9781450391993
Reproducibility in computer science is often seen as a difficult to impossible task requiring bespoke hardware and software that others simply cannot field. Because of this, alternative approaches to reproducibility for computer systems is required. This workshop offers experiences and innovations in practical approaches for reproducibility for computer systems. The workshop also serves as the home of the ACM Exploratory Interest Group on Reproducibility and a community gathering for those interested in reproducible computer science research.
Heterogeneous hardware platforms comprised of CPUs, GPUs, and other accelerators offer the opportunity to choose the best-suited device for executing a given scientific simulation in order to minimize execution time a...
详细信息
Detecting malware during execution using machine learning models presents some hard-to-solve problems relating to data set construction seldom discussed in the literature. We identify, name these problems and show our...
详细信息
ISBN:
(纸本)9781665432818
Detecting malware during execution using machine learning models presents some hard-to-solve problems relating to data set construction seldom discussed in the literature. We identify, name these problems and show our solutions to them in the form of Curator, a specialized distributed system for detonating potentially malicious programs, extracting behavior information, and correctly labeling said behavior to construct an accurate, consistent, and reliable data set. We demonstrate Curator's need by using generated data sets to train machine learning models based on Naive Bayes, Logistic Regression, and Random Forests. Our work is currently focused on the Windows operating system.
Modern software engineering is getting increasingly complicated. Especially in the HPC field, we are dealing with cutting edge infrastructure and a novel problem with unprecedented scale. The ability to monitor and an...
详细信息
Cyber-physical systems (CPS) are computer systems with integrated software and physical components that ideally seamlessly interact with the real world and each other. While the use of distributed CPS has rapidly grow...
详细信息
ISBN:
(纸本)9781665438193
Cyber-physical systems (CPS) are computer systems with integrated software and physical components that ideally seamlessly interact with the real world and each other. While the use of distributed CPS has rapidly grown over the past decade, so has the need for developing efficient methods to ascertain reliability of these systems by validating their correctness. Since exhaustively validating correctness of a distributed CPS is usually not feasible nor possible, many modern validation methods involve run-time verification of distributed CPS based on safety properties. Our work focuses on developing time and resource efficient assurance techniques that can run in parallel with the execution of these systems to ensure reliability.
暂无评论