Zum Hauptinhalt springen

Showing 1–6 of 6 results for author: Bos, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15112  [pdf, other

    cs.NE

    Micro-power spoken keyword spotting on Xylo Audio 2

    Authors: Hannah Bos, Dylan R. Muir

    Abstract: For many years, designs for "Neuromorphic" or brain-like processors have been motivated by achieving extreme energy efficiency, compared with von-Neumann and tensor processor devices. As part of their design language, Neuromorphic processors take advantage of weight, parameter, state and activity sparsity. In the extreme case, neural networks based on these principles mimic the sparse activity oof… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2208.12991  [pdf, other

    cs.NE cs.AI cs.ET cs.LG cs.SD eess.AS

    Sub-mW Neuromorphic SNN audio processing applications with Rockpool and Xylo

    Authors: Hannah Bos, Dylan Muir

    Abstract: Spiking Neural Networks (SNNs) provide an efficient computational mechanism for temporal signal processing, especially when coupled with low-power SNN inference ASICs. SNNs have been historically difficult to configure, lacking a general method for finding solutions for arbitrary tasks. In recent years, gradient-descent optimization methods have been applied to SNNs with increasing ease. SNNs and… ▽ More

    Submitted 20 September, 2022; v1 submitted 27 August, 2022; originally announced August 2022.

    Comments: This submission has been removed by arXiv administrators because the submitter did not have the authority to grant a license to the work at the time of submission

  3. arXiv:2007.03302  [pdf, ps, other

    cs.CR

    VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

    Authors: Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos

    Abstract: Polymorphism and inheritance make C++ suitable for writing complex software, but significantly increase the attack surface because the implementation relies on virtual function tables (vtables). These vtables contain function pointers that attackers can potentially hijack and in practice, vtable hijacking is one of the most important attack vector for C++ binaries. In this paper, we present VTab… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: Published in Annual Computer Security Applications Conference (ACSAC'19)

  4. arXiv:2004.01807  [pdf, other

    cs.CR

    TRRespass: Exploiting the Many Sides of Target Row Refresh

    Authors: Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi

    Abstract: After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what was meant to be the definitive hardware solution against the RowHammer problem: Target Row Refresh (TRR). A common belief among practitioners is that, for the latest generation of DDR4 systems that are protected by TRR, RowHammer is no longer an issue in practice. However, in reality, very little is… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: 16 pages, 16 figures, in proceedings IEEE S&P 2020

    ACM Class: B.8.1

  5. arXiv:1901.10794  [pdf, other

    cs.CY cs.CR

    Malicious cryptocurrency miners: Status and Outlook

    Authors: Radhesh Krishnan Konoth, Rolf van Wegberg, Veelasha Moonsamy, Herbert Bos

    Abstract: In this study, we examine the behavior and profitability of modern malware that mines cryptocurrency. Unlike previous studies, we look at the cryptocurrency market as a whole, rather than just Bitcoin. We not only consider PCs, but also mobile phones, and IoT devices. In the past few years, criminals have attacked all these platforms for the purpose of cryptocurrency mining. The question is: how m… ▽ More

    Submitted 29 January, 2019; originally announced January 2019.

  6. arXiv:1801.02381  [pdf, other

    cs.CR

    Benchmarking Crimes: An Emerging Threat in Systems Security

    Authors: Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Gernot Heiser

    Abstract: Properly benchmarking a system is a difficult and intricate task. Unfortunately, even a seemingly innocuous benchmarking mistake can compromise the guarantees provided by a given systems security defense and also put its reproducibility and comparability at risk. This threat is particularly insidious as it is generally not a result of malice and can easily go undetected by both authors and reviewe… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.