Skip to main content

Showing 1–5 of 5 results for author: Bourgeat, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.04714  [pdf, other

    cs.DC cs.AR

    Parendi: Thousand-Way Parallel RTL Simulation

    Authors: Mahyar Emami, Thomas Bourgeat, James Larus

    Abstract: Hardware development relies on simulations, particularly cycle-accurate RTL (Register Transfer Level) simulations, which consume significant time. As single-processor performance grows only slowly, conventional, single-threaded RTL simulation is becoming less practical for increasingly complex chips and systems. A solution is parallel RTL simulation, where ideally, simulators could run on thousand… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

  2. arXiv:2306.14882  [pdf, other

    cs.CR cs.AR

    Citadel: Real-World Hardware-Software Contracts for Secure Enclaves Through Microarchitectural Isolation and Controlled Speculation

    Authors: Jules Drean, Miguel Gomez-Garcia, Fisher Jepsen, Thomas Bourgeat, Srinivas Devadas

    Abstract: Hardware isolation primitives such as secure enclaves aim to protect sensitive programs, but remain vulnerable to transient execution attacks. Complete microarchitectural isolation is not a satisfactory defense mechanism as it leaves out public shared memory, critical for usability and application performance. Conversely, hardware-software co-designs for secure speculation can counter these attack… ▽ More

    Submitted 8 May, 2024; v1 submitted 26 June, 2023; originally announced June 2023.

  3. arXiv:2104.00762  [pdf, other

    cs.LO

    Flexible Instruction-Set Semantics via Type Classes

    Authors: Thomas Bourgeat, Ian Clester, Andres Erbsen, Samuel Gruetter, Pratap Singh, Andrew Wright, Adam Chlipala

    Abstract: Instruction sets, from families like x86 and ARM, are at the center of many ambitious formal-methods projects. Many verification, synthesis, programming, and debugging tools rely on formal semantics of instruction sets, but different tools can use semantics in rather different ways. As a result, a central challenge for that community is how semantics should be written and what techniques should be… ▽ More

    Submitted 16 November, 2022; v1 submitted 1 April, 2021; originally announced April 2021.

  4. arXiv:1812.09822  [pdf, other

    cs.CR cs.OS

    MI6: Secure Enclaves in a Speculative Out-of-Order Processor

    Authors: Thomas Bourgeat, Ilia Lebedev, Andrew Wright, Sizhuo Zhang, Arvind, Srinivas Devadas

    Abstract: Recent attacks have broken process isolation by exploiting microarchitectural side channels that allow indirect access to shared microarchitectural state. Enclaves strengthen the process abstraction to restore isolation guarantees. We propose MI6, an aggressive, speculative out-of-order processor capable of providing secure enclaves under a threat model that includes an untrusted OS and an attac… ▽ More

    Submitted 29 August, 2019; v1 submitted 23 December, 2018; originally announced December 2018.

    Comments: 15 pages

  5. arXiv:1405.1402  [pdf, ps, other

    cs.CV

    New Algorithmic Approaches to Point Constellation Recognition

    Authors: Thomas Bourgeat, Julien Bringer, Herve Chabanne, Robin Champenois, Jeremie Clement, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard

    Abstract: Point constellation recognition is a common problem with many pattern matching applications. Whilst useful in many contexts, this work is mainly motivated by fingerprint matching. Fingerprints are traditionally modelled as constellations of oriented points called minutiae. The fingerprint verifier's task consists in comparing two point constellations. The compared constellations may differ by rota… ▽ More

    Submitted 24 March, 2014; originally announced May 2014.

    Comments: 14 pages, short version submitted to SEC 2014