Seminars

Reference 1

  • Oakland 2020
  • Reference 1 Videos: https://www.youtube.com/channel/UC6pXMS7qre9GZW7A7FVM90Q/videos Opening Missing Doug Tygar, from UC berkeley. Awards. 104 out of 8xx. ~12% Mem Safety xMP Data oriented programming xen altp2m ptr -> hash -> key Buddy allocator context switch read-only permissions from outside of xMP domain. Talk with P. seL4: no trust on hardware; verified safe. PSOS: layer ontop of layer; verify one layer ontop of a verified layer. CHERI: security in market in 3~4 years.

  • 2020 Asplos
  • Reference 1 Most influential: Africa(Kenya) zebra tracking; peer-to-peer epidemic propagation; energy saving. Betteryless in IoT: Intermittent Timekeeping in Intermittent Computing RC circuits: capacitor discharged time. This work: a sequential discharged chain of RC circuits instead of one. TotalRecall Avoid all NVM-writes by taking checkpoints that reside entirely in SRAM. SRAM volatility: ~5 minutes (20 C) Long time off times: predictable; irrelavant; TICS: Batteryless on legacy software Time annotated C source.

  • Ur
  • Seminars/Lectures December 02 Nathan Beckmann From CMU. Pushing the limits of online and offline caching. Marry thery and practice computing tight bounds on OPT even when is NP-hard. E.G. Mysql, cache can be 100x faster. Caches: Think smarter, not larger: a better cache policy. LRU, ++. Caching: theory questions; practical questions; online & offline policies. ==> an intersection of these. Beckmann, NSDI’18. LHD, AdaptSize, Hyperbolic, GDSF, LRU. Figure.

  • 2022 Arm Tech Symposia
  • References: Live link CEO, Rene Haas. Mohamed Awad. “the future is built on arm” World’s global infrastructure. ARM Neoverse: E/N/Y-series. E: Efficient throughput N: Scale Out Performance V: Arm AMBA CHI (Chai) CMN: Core Mesh Network. Cloud, development for free: alibaba, aws, google 5G Solutions Lab. Software defined vehicle on arm. 100M lines of code on a vehicle. engine, …., adas corte x-a52 IoT: Fighting Fragmentation: Matter protocols, for Smarthome


  1. reference ↩
Created Dec 2, 2019 // Last Updated May 18, 2021

If you could revise
the fundmental principles of
computer system design
to improve security...

... what would you change?