Skip to main content

Showing 1–3 of 3 results for author: DeHon, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2104.01929  [pdf

    cs.DC cs.AR cs.NI cs.SE

    Meta-level issues in Offloading: Sco**, Composition, Development, and their Automation

    Authors: André DeHon, Hans Giesen, Nik Sultana, Yuanlong Xiao

    Abstract: This paper argues for an accelerator development toolchain that takes into account the whole system containing the accelerator. With whole-system visibility, the toolchain can better assist accelerator sco** and composition in the context of the expected workloads and intended performance objectives. Despite being focused on the 'meta-level' of accelerators, this would build on existing and ongo… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

  2. arXiv:2011.00253  [pdf, other

    cs.CR

    Mir: Automated Quantifiable Privilege Reduction Against Dynamic Library Compromise in JavaScript

    Authors: Nikos Vasilakis, Cristian-Alexandru Staicu, Grigoris Ntousakis, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel

    Abstract: Third-party libraries ease the development of large-scale software systems. However, they often execute with significantly more privilege than needed to complete their task. This additional privilege is often exploited at runtime via dynamic compromise, even when these libraries are not actively malicious. Mir addresses this problem by introducing a fine-grained read-write-execute (RWX) permission… ▽ More

    Submitted 1 January, 2021; v1 submitted 31 October, 2020; originally announced November 2020.

  3. arXiv:1509.06503  [pdf, other

    cs.PL

    A Verified Information-Flow Architecture

    Authors: Arthur Azevedo de Amorim, Nathan Collins, André DeHon, Delphine Demange, Catalin Hritcu, David Pichardie, Benjamin C. Pierce, Randy Pollack, Andrew Tolmach

    Abstract: SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for tracking and limiting information flows. At the lowest level, the SAFE hardware supports fine-grained programmable tags, with efficient and flexible propagation and combination of tags as instructions are executed. The operating system virtualizes these generic facilities to present an information-flow… ▽ More

    Submitted 6 March, 2016; v1 submitted 22 September, 2015; originally announced September 2015.