by Jakub Szefer on Mar 1, 2023 | Tags: Cryptography, Post Quantum Cryptography, Quantum Computing, Security
Introduction Quantum computer architecture security research is a new and active research field. As the new year and semester is under way, this article looks back at the recent quantum computer architecture security papers published or posted online in the prior year...
Read more...
by Mengjia Yan on Jan 27, 2023 | This blog post summarizes my recent keynote talk at the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). The talk shares some of my humble opinions about the current microarchitecture security research landscape and points...
Read more...
by Dan Manjarres on Jan 12, 2023 | Tags: Benchmarks, experiments, Methodology, Networking
Networking performance is critical to distributed applications, and there are always efforts underway to improve the performance of datacenter network communication stacks. These efforts take a variety of approaches. For example, they may result in either new hardware...
Read more...
by Fred Chong and Kaitlin Smith on Jan 9, 2023 | Quantum Computers (QCs), once thought of as an elusive theoretical concept, are emerging. Today’s quantum devices, however, are still small prototypes since their computing infrastructure is in its early stages. Recent industry roadmaps have started to propose a...
Read more...
by Lieven Eeckhout on Dec 29, 2022 | “If you cannot measure it, you cannot improve it.” – Lord Kelvin The IEEE International Symposium on Workload Characterization (IISWC) just celebrated its 25th anniversary. This is an excellent opportunity to look back and forward—at what has happened over the past 25...
Read more...
by Richard L. Sites on Dec 19, 2022 | Tags: Architecture, Data Centers, Memory, Performance
When I worked at Google, fleet-wide profiling revealed that 25-35% of all CPU time was spent just moving bytes around: memcpy, strcmp, copying between user and kernel buffers in network and disk I/O, hidden copy-on-write in soft page faults, checksumming, compressing,...
Read more...
by Dmitry Ponomarev on Nov 8, 2022 | Microarchitectural and hardware security remained a very active research area in 2022. Top computer architecture conferences each had multiple sessions dedicated to security (4 sessions at ISCA’22, and 3 sessions each at MICRO’22, HPCA’22 and ASPLOS’22). However,...
Read more...
by Murali Annavaram on Oct 14, 2022 | Tags: Memoriam, Michel Dubois, USC
It is with deep sadness and great sorrow that we inform the community about the recent passing of our dear friend and colleague, Professor Michel Dubois, a foundational leader in our field of computer architecture and parallel processing. In Michel’s honor, a memorial symposium in celebration of his life and scholarly contributions will be held on Saturday, October 29th, at USC in Los Angeles, California.
Read more...
by Jakub Szefer on Oct 10, 2022 | Tags: Architecture, Quantum Computing, Security
Introduction When thinking of security and quantum computers, many people may automatically think of using quantum computers for attacks on classical computers, by use of the Grover’s and Shor’s algorithms running on the quantum computers to break a number of existing...
Read more...
by Jishen Zhao on Sep 29, 2022 | Tags: Autonomous driving, Research
At 6pm in the evening, you get into a car and tell the restaurant you will have dinner. The car will drive itself there, while you may choose to read a book, surf the web, or take a nap. You may have once considered this a science fiction scene, but now it is becoming...
Read more...