Skip to main content

Showing 1–15 of 15 results for author: Asanović, K

.
  1. MoCA: Memory-Centric, Adaptive Execution for Multi-Tenant Deep Neural Networks

    Authors: Seah Kim, Hasan Genc, Vadim Vadimovich Nikiforov, Krste Asanović, Borivoje Nikolić, Yakun Sophia Shao

    Abstract: Driven by the wide adoption of deep neural networks (DNNs) across different application domains, multi-tenancy execution, where multiple DNNs are deployed simultaneously on the same hardware, has been proposed to satisfy the latency requirements of different applications while improving the overall system utilization. However, multi-tenancy execution could lead to undesired system-level resource c… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: 2023 HPCA, Reproducibility Badges (Open Research Objects, Research Objects Reviewed, Results Reproduced)

  2. arXiv:2211.02179  [pdf, other

    cs.CR

    Verifying RISC-V Physical Memory Protection

    Authors: Kevin Cheang, Cameron Rasmussen, Dayeol Lee, David W. Kohlbrenner, Krste Asanović, Sanjit A. Seshia

    Abstract: We formally verify an open-source hardware implementation of physical memory protection (PMP) in RISC-V, which is a standard feature used for memory isolation in security critical systems such as the Keystone trusted execution environment. PMP provides per-hardware-thread machine-mode control registers that specify the access privileges for physical memory regions. We first formalize the functiona… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: SECRISC-V 2019 Workshop

  3. Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing

    Authors: Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, Krste Asanović

    Abstract: Hardware enclaves rely on a disjoint memory model, which maps each physical address to an enclave to achieve strong memory isolation. However, this severely limits the performance and programmability of enclave programs. While some prior work proposes enclave memory sharing, it does not provide a formal model or verification of their designs. This paper presents Cerberus, a formal approach to secu… ▽ More

    Submitted 14 November, 2022; v1 submitted 30 September, 2022; originally announced September 2022.

    Comments: ACM CCS 2022

  4. arXiv:2005.13685  [pdf, other

    cs.DC cs.AI cs.LG cs.PF cs.PL

    ProTuner: Tuning Programs with Monte Carlo Tree Search

    Authors: Ameer Haj-Ali, Hasan Genc, Qi**g Huang, William Moses, John Wawrzynek, Krste Asanović, Ion Stoica

    Abstract: We explore applying the Monte Carlo Tree Search (MCTS) algorithm in a notoriously difficult task: tuning programs for high-performance deep learning and image processing. We build our framework on top of Halide and show that MCTS can outperform the state-of-the-art beam-search algorithm. Unlike beam search, which is guided by greedy intermediate performance comparisons between partial and less mea… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

  5. arXiv:2003.00671  [pdf, other

    cs.DC cs.LG cs.PL

    AutoPhase: Juggling HLS Phase Orderings in Random Forests with Deep Reinforcement Learning

    Authors: Qi**g Huang, Ameer Haj-Ali, William Moses, John Xiang, Ion Stoica, Krste Asanovic, John Wawrzynek

    Abstract: The performance of the code a compiler generates depends on the order in which it applies the optimization passes. Choosing a good order--often referred to as the phase-ordering problem, is an NP-hard problem. As a result, existing solutions rely on a variety of heuristics. In this paper, we evaluate a new technique to address the phase-ordering problem: deep reinforcement learning. To this end, w… ▽ More

    Submitted 4 March, 2020; v1 submitted 2 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: text overlap with arXiv:1901.04615

  6. arXiv:1911.09925  [pdf, other

    cs.DC cs.AR cs.LG cs.PF

    Gemmini: Enabling Systematic Deep-Learning Architecture Evaluation via Full-Stack Integration

    Authors: Hasan Genc, Seah Kim, Alon Amid, Ameer Haj-Ali, Vighnesh Iyer, Pranav Prakash, Jerry Zhao, Daniel Grubb, Harrison Liew, Howard Mao, Albert Ou, Colin Schmidt, Samuel Steffl, John Wright, Ion Stoica, Jonathan Ragan-Kelley, Krste Asanovic, Borivoje Nikolic, Yakun Sophia Shao

    Abstract: DNN accelerators are often developed and evaluated in isolation without considering the cross-stack, system-level effects in real-world environments. This makes it difficult to appreciate the impact of System-on-Chip (SoC) resource contention, OS overheads, and programming-stack inefficiencies on overall performance/energy-efficiency. To address this challenge, we present Gemmini, an open-source*,… ▽ More

    Submitted 9 July, 2021; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: To appear at the 58th IEEE/ACM Design Automation Conference (DAC), December 2021, San Francisco, CA, USA

  7. arXiv:1909.13639  [pdf, other

    cs.DC cs.PF cs.PL

    NeuroVectorizer: End-to-End Vectorization with Deep Reinforcement Learning

    Authors: Ameer Haj-Ali, Nesreen K. Ahmed, Ted Willke, Sophia Shao, Krste Asanovic, Ion Stoica

    Abstract: One of the key challenges arising when compilers vectorize loops for today's SIMD-compatible architectures is to decide if vectorization or interleaving is beneficial. Then, the compiler has to determine how many instructions to pack together and how many loop iterations to interleave. Compilers are designed today to use fixed-cost models that are based on heuristics to make vectorization decision… ▽ More

    Submitted 4 January, 2020; v1 submitted 20 September, 2019; originally announced September 2019.

  8. arXiv:1908.01275  [pdf, other

    cs.LG cs.AI eess.SY

    A View on Deep Reinforcement Learning in System Optimization

    Authors: Ameer Haj-Ali, Nesreen K. Ahmed, Ted Willke, Joseph Gonzalez, Krste Asanovic, Ion Stoica

    Abstract: Many real-world systems problems require reasoning about the long term consequences of actions taken to configure and manage the system. These problems with delayed and often sequentially aggregated reward, are often inherently reinforcement learning problems and present the opportunity to leverage the recent substantial advances in deep reinforcement learning. However, in some cases, it is not cl… ▽ More

    Submitted 4 September, 2019; v1 submitted 4 August, 2019; originally announced August 2019.

  9. arXiv:1907.10119  [pdf, other

    cs.CR cs.OS

    Keystone: An Open Framework for Architecting TEEs

    Authors: Dayeol Lee, David Kohlbrenner, Shweta Shinde, Dawn Song, Krste Asanović

    Abstract: Trusted execution environments (TEEs) are being used in all the devices from embedded sensors to cloud servers and encompass a range of cost, power constraints, and security threat model choices. On the other hand, each of the current vendor-specific TEEs makes a fixed set of trade-offs with little room for customization. We present Keystone -- the first open-source framework for building customiz… ▽ More

    Submitted 7 September, 2019; v1 submitted 23 July, 2019; originally announced July 2019.

    Comments: 18 pages

  10. arXiv:1901.04615  [pdf, other

    cs.PL cs.LG

    AutoPhase: Compiler Phase-Ordering for High Level Synthesis with Deep Reinforcement Learning

    Authors: Ameer Haj-Ali, Qi**g Huang, William Moses, John Xiang, Ion Stoica, Krste Asanovic, John Wawrzynek

    Abstract: The performance of the code generated by a compiler depends on the order in which the optimization passes are applied. In high-level synthesis, the quality of the generated circuit relates directly to the code generated by the front-end compiler. Choosing a good order--often referred to as the phase-ordering problem--is an NP-hard problem. In this paper, we evaluate a new technique to address the… ▽ More

    Submitted 3 April, 2019; v1 submitted 14 January, 2019; originally announced January 2019.

  11. arXiv:1812.10605  [pdf, other

    cs.CR

    Sanctorum: A lightweight security monitor for secure enclaves

    Authors: Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas

    Abstract: Enclaves have emerged as a particularly compelling primitive to implement trusted execution environments: strongly isolated sensitive user-mode processes in a largely untrusted software environment. While the threat models employed by various enclave systems differ, the high-level guarantees they offer are essentially the same: attestation of an enclave's initial state, as well as a guarantee of e… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

    Comments: 6 pages

  12. arXiv:1804.10642  [pdf, other

    cs.DC

    Co-Design of Deep Neural Nets and Neural Net Accelerators for Embedded Vision Applications

    Authors: Kiseok Kwon, Alon Amid, Amir Gholami, Bichen Wu, Krste Asanovic, Kurt Keutzer

    Abstract: Deep Learning is arguably the most rapidly evolving research area in recent years. As a result it is not surprising that the design of state-of-the-art deep neural net models proceeds without much consideration of the latest hardware targets, and the design of neural net accelerators proceeds without much consideration of the characteristics of the latest deep neural net models. Nevertheless, in t… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: This paper is trimmed to 6 pages to meet the conference requirement. A longer version with more detailed discussion will be released afterwards

  13. arXiv:1705.04590  [pdf, other

    cs.DC

    Distributed-Memory Breadth-First Search on Massive Graphs

    Authors: Aydin Buluc, Scott Beamer, Kamesh Madduri, Krste Asanovic, David Patterson

    Abstract: This chapter studies the problem of traversing large graphs using the breadth-first search order on distributed-memory supercomputers. We consider both the traditional level-synchronous top-down algorithm as well as the recently discovered direction optimizing algorithm. We analyze the performance and scalability trade-offs in using different local data structures such as CSR and DCSC, enabling in… ▽ More

    Submitted 10 May, 2017; originally announced May 2017.

    Comments: arXiv admin note: text overlap with arXiv:1104.4518

  14. arXiv:1607.02318  [pdf, other

    cs.AR

    The Renewed Case for the Reduced Instruction Set Computer: Avoiding ISA Bloat with Macro-Op Fusion for RISC-V

    Authors: Christopher Celio, Palmer Dabbelt, David A. Patterson, Krste Asanović

    Abstract: This report makes the case that a well-designed Reduced Instruction Set Computer (RISC) can match, and even exceed, the performance and code density of existing commercial Complex Instruction Set Computers (CISC) while maintaining the simplicity and cost-effectiveness that underpins the original RISC goals. We begin by comparing the dynamic instruction counts and dynamic instruction bytes fetche… ▽ More

    Submitted 8 July, 2016; originally announced July 2016.

    Report number: UCB/EECS-2016-130

  15. arXiv:1508.03619  [pdf, ps, other

    cs.DC cs.DS

    The GAP Benchmark Suite

    Authors: Scott Beamer, Krste Asanović, David Patterson

    Abstract: We present a graph processing benchmark suite with the goal of hel** to standardize graph processing evaluations. Fewer differences between graph processing evaluations will make it easier to compare different research efforts and quantify improvements. The benchmark not only specifies graph kernels, input graphs, and evaluation methodologies, but it also provides optimized baseline implementati… ▽ More

    Submitted 16 May, 2017; v1 submitted 14 August, 2015; originally announced August 2015.

    Comments: small revisions to correspond to v1.0