Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Fletcher, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10491  [pdf, other

    cs.AR

    FuseMax: Leveraging Extended Einsums to Optimize Attention Accelerator Design

    Authors: Nandeeka Nayak, Xinrui Wu, Toluwanimi O. Odemuyiwa, Michael Pellauer, Joel S. Emer, Christopher W. Fletcher

    Abstract: Attention for transformers is a critical workload that has recently received significant "attention" as a target for custom acceleration. Yet, while prior work succeeds in reducing attention's memory-bandwidth requirements, it creates load imbalance between attention operators (resulting in severe compute under-utilization) and requires on-chip memory that scales with sequence length (which is exp… ▽ More

    Submitted 25 June, 2024; v1 submitted 15 June, 2024; originally announced June 2024.

    Comments: 15 pages, 10 figures

  2. arXiv:2406.05066  [pdf, other

    cs.DS

    Efficient Centroid-Linkage Clustering

    Authors: MohammadHossein Bateni, Laxman Dhulipala, Willem Fletcher, Kishen N Gowda, D Ellis Hershkowitz, Rajesh Jayaram, Jakub Łącki

    Abstract: We give an efficient algorithm for Centroid-Linkage Hierarchical Agglomerative Clustering (HAC), which computes a $c$-approximate clustering in roughly $n^{1+O(1/c^2)}$ time. We obtain our result by combining a new Centroid-Linkage HAC algorithm with a novel fully dynamic data structure for nearest neighbor search which works under adaptive updates. We also evaluate our algorithm empirically. By… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  3. Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version)

    Authors: Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas

    Abstract: Last-level cache side-channel attacks have been mostly demonstrated in highly-controlled, quiescent local environments. Hence, it is unclear whether such attacks are feasible in a production cloud environment. In the cloud, side channels are flooded with noise from activities of other tenants and, in Function-as-a-Service (FaaS) workloads, the attacker has a very limited time window to mount the a… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Journal ref: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2024), Volume 2, pages 582-600, La Jolla, CA, USA, May 2024

  4. DECLASSIFLOW: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures (Full Version)

    Authors: Rutvik Choudhary, Alan Wang, Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher

    Abstract: Speculative execution attacks undermine the security of constant-time programming, the standard technique used to prevent microarchitectural side channels in security-sensitive software such as cryptographic code. Constant-time code must therefore also deploy a defense against speculative execution attacks to prevent leakage of secret data stored in memory or the processor registers. Unfortunately… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Journal ref: In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23). Association for Computing Machinery, New York, NY, USA, 2053-2067

  5. TeAAL: A Declarative Framework for Modeling Sparse Tensor Accelerators

    Authors: Nandeeka Nayak, Toluwanimi O. Odemuyiwa, Shubham Ugare, Christopher W. Fletcher, Michael Pellauer, Joel S. Emer

    Abstract: Over the past few years, the explosion in sparse tensor algebra workloads has led to a corresponding rise in domain-specific accelerators to service them. Due to the irregularity present in sparse tensors, these accelerators employ a wide variety of novel solutions to achieve good performance. At the same time, prior work on design-flexible sparse accelerator modeling does not express this full ra… ▽ More

    Submitted 11 June, 2024; v1 submitted 16 April, 2023; originally announced April 2023.

    Comments: 17 pages, 13 figures

  6. arXiv:2109.02896  [pdf, other

    cs.ET

    Robust Real-time Computing with Chemical Reaction Networks

    Authors: Willem Fletcher, Titus H. Klinge, James I. Lathrop, Dawn A. Nye, Matthew Rayman

    Abstract: Recent research into analog computing has introduced new notions of computing real numbers. Huang, Klinge, Lathrop, Li, and Lutz defined a notion of computing real numbers in real-time with chemical reaction networks (CRNs), introducing the classes $\mathbb{R}_\text{LCRN}$ (the class of all Lyapunov CRN-computable real numbers) and $\mathbb{R}_\text{RTCRN}$ (the class of all real-time CRN-computab… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 15 pages, 1 figure

  7. arXiv:2107.07341  [pdf

    cs.HC cs.AI cs.DC cs.LG cs.NE cs.SI

    Utilizing a digital swarm intelligence platform to improve consensus among radiologists and exploring its applications

    Authors: Rutwik Shah, Bruno Astuto, Tyler Gleason, Will Fletcher, Justin Banaga, Kevin Sweetwood, Allen Ye, Rina Patel, Kevin McGill, Thomas Link, Jason Crane, Valentina Pedoia, Sharmila Majumdar

    Abstract: Radiologists today play a key role in making diagnostic decisions and labeling images for training A.I. algorithms. Low inter-reader reliability (IRR) can be seen between experts when interpreting challenging cases. While teams-based decisions are known to outperform individual decisions, inter-personal biases often creep up in group interactions which limit non-dominant participants from expressi… ▽ More

    Submitted 6 September, 2021; v1 submitted 26 June, 2021; originally announced July 2021.

    Comments: 29 pages, 3 tables, 7 figures

  8. arXiv:2103.03443  [pdf, other

    cs.CR cs.AR

    Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical

    Authors: Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher

    Abstract: We introduce the first microarchitectural side channel attacks that leverage contention on the CPU ring interconnect. There are two challenges that make it uniquely difficult to exploit this channel. First, little is known about the ring interconnect's functioning and architecture. Second, information that can be learned by an attacker through ring contention is noisy by nature and has coarse spat… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

    Comments: This is the extended version of a paper that appears in USENIX Security 2021

  9. Mind Mappings: Enabling Efficient Algorithm-Accelerator Mapping Space Search

    Authors: Kartik Hegde, Po-An Tsai, Sitao Huang, Vikas Chandra, Angshuman Parashar, Christopher W. Fletcher

    Abstract: Modern day computing increasingly relies on specialization to satiate growing performance and efficiency requirements. A core challenge in designing such specialized hardware architectures is how to perform mapping space search, i.e., search for an optimal mapping from algorithm to hardware. Prior work shows that choosing an inefficient mapping can lead to multiplicative-factor efficiency overhead… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

    Comments: Appears in the proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '21), April 19-23, 2021, Virtual, USA

  10. arXiv:2102.05195  [pdf, other

    cs.CR

    DOVE: A Data-Oblivious Virtual Environment

    Authors: Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter

    Abstract: Users can improve the security of remote communications by using Trusted Execution Environments (TEEs) to protect against direct introspection and tampering of sensitive data. This can even be done with applications coded in high-level languages with complex programming stacks such as R, Python, and Ruby. However, this creates a trade-off between programming convenience versus the risk of attacks… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: Appears in the proceedings of the 28th Network and Distributed System Security Symposium (NDSS), 2021

  11. arXiv:2101.07897  [pdf, other

    cs.CR cs.CY

    Safer Illinois and RokWall: Privacy Preserving University Health Apps for COVID-19

    Authors: Vikram Sharma Mailthody, James Wei, Nicholas Chen, Mohammad Behnia, Ruihao Yao, Qihao Wang, Vedant Agrawal, Churan He, Lijian Wang, Leihao Chen, Amit Agarwal, Edward Richter, Wen-Mei Hwu, Christopher W. Fletcher, Jinjun Xiong, Andrew Miller, Sanjay Patel

    Abstract: COVID-19 has fundamentally disrupted the way we live. Government bodies, universities, and companies worldwide are rapidly developing technologies to combat the COVID-19 pandemic and safely reopen society. Essential analytics tools such as contact tracing, super-spreader event detection, and exposure mapping require collecting and analyzing sensitive user information. The increasing use of such po… ▽ More

    Submitted 17 March, 2021; v1 submitted 19 January, 2021; originally announced January 2021.

    Comments: Appears in the Workshop on Secure IT Technologies against COVID-19(CoronaDef) 2021

  12. arXiv:2007.11818  [pdf, other

    cs.AR cs.CR

    Speculative Interference Attacks: Breaking Invisible Speculation Schemes

    Authors: Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos Rozas, Adam Morrison, Frank Mckeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa Alameldeen

    Abstract: Recent security vulnerabilities that target speculative execution (e.g., Spectre) present a significant challenge for processor design. The highly publicized vulnerability uses speculative execution to learn victim secrets by changing cache state. As a result, recent computer architecture research has focused on invisible speculation mechanisms that attempt to block changes in cache state due to s… ▽ More

    Submitted 23 April, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: Updated CR Version

  13. arXiv:2002.09786  [pdf, other

    cs.LG cs.CV stat.ML

    HarDNN: Feature Map Vulnerability Evaluation in CNNs

    Authors: Abdulrahman Mahmoud, Siva Kumar Sastry Hari, Christopher W. Fletcher, Sarita V. Adve, Charbel Sakr, Naresh Shanbhag, Pavlo Molchanov, Michael B. Sullivan, Timothy Tsai, Stephen W. Keckler

    Abstract: As Convolutional Neural Networks (CNNs) are increasingly being employed in safety-critical applications, it is important that they behave reliably in the face of hardware errors. Transient hardware errors may percolate undesirable state during execution, resulting in software-manifested errors which can adversely affect high-level decision making. This paper presents HarDNN, a software-directed ap… ▽ More

    Submitted 25 February, 2020; v1 submitted 22 February, 2020; originally announced February 2020.

    Comments: 14 pages, 5 figures, a short version accepted for publication in First Workshop on Secure and Resilient Autonomy (SARA) co-located with MLSys2020

  14. arXiv:1810.06807  [pdf, other

    cs.LG cs.AR cs.NE stat.ML

    Morph: Flexible Acceleration for 3D CNN-based Video Understanding

    Authors: Kartik Hegde, Rohit Agrawal, Yulun Yao, Christopher W. Fletcher

    Abstract: The past several years have seen both an explosion in the use of Convolutional Neural Networks (CNNs) and the design of accelerators to make CNN inference practical. In the architecture community, the lion share of effort has targeted CNN inference for image recognition. The closely related problem of video recognition has received far less attention as an accelerator target. This is surprising, a… ▽ More

    Submitted 16 October, 2018; originally announced October 2018.

    Comments: Appears in the proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2018

  15. arXiv:1804.06508  [pdf, other

    cs.NE cs.LG

    UCNN: Exploiting Computational Reuse in Deep Neural Networks via Weight Repetition

    Authors: Kartik Hegde, Jiyong Yu, Rohit Agrawal, Mengjia Yan, Michael Pellauer, Christopher W. Fletcher

    Abstract: Convolutional Neural Networks (CNNs) have begun to permeate all corners of electronic society (from voice recognition to scene generation) due to their high accuracy and machine efficiency per operation. At their core, CNN computations are made up of multi-dimensional dot products between weight and input vectors. This paper studies how weight repetition ---when the same weight occurs multiple tim… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

    Comments: Appears in the proceedings of the 45th International Symposium on Computer Architecture~(ISCA), 2018