Skip to main content

Showing 1–9 of 9 results for author: Silberstein, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.11829  [pdf, other

    cs.AI cs.DC math.NT

    Algorithm-assisted discovery of an intrinsic order among mathematical constants

    Authors: Rotem Elimelech, Ofir David, Carlos De la Cruz Mengual, Rotem Kalisch, Wolfgang Berndt, Michael Shalyt, Mark Silberstein, Yaron Hadad, Ido Kaminer

    Abstract: In recent decades, a growing number of discoveries in fields of mathematics have been assisted by computer algorithms, primarily for exploring large parameter spaces that humans would take too long to investigate. As computers and algorithms become more powerful, an intriguing possibility arises - the interplay between human intuition and computer algorithms can lead to discoveries of novel mathem… ▽ More

    Submitted 16 October, 2023; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: 21 pages, 6 figures, and 1 table; with 9 appendix sections totaling 12 pages, 1 figure, and 4 tables

    Journal ref: PNAS 121 (25) e2321440121 (2024)

  2. arXiv:2301.07642  [pdf, other

    cs.CR

    Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing

    Authors: Oleksii Oleksenko, Marco Guarnieri, Boris Köpf, Mark Silberstein

    Abstract: Attacks like Spectre abuse speculative execution, one of the key performance optimizations of modern CPUs. Recently, several testing tools have emerged to automatically detect speculative leaks in commercial (black-box) CPUs. However, the testing process is still slow, which has hindered in-depth testing campaigns, and so far prevented the discovery of new classes of leakage. In this paper, we i… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

    Comments: To appear in IEEE S&P 2023

  3. arXiv:2211.07185  [pdf, other

    cs.CR

    Securing Access to Untrusted Services From TEEs with GateKeeper

    Authors: Meni Orenbach, Bar Raveh, Alon Berkenstadt, Yan Michalevsky, Shachar Itzhaky, Mark Silberstein

    Abstract: Applications running in Trusted Execution Environments (TEEs) commonly use untrusted external services such as host File System. Adversaries may maliciously alter the normal service behavior to trigger subtle application bugs that would have never occurred under correct service operation, causing data leaks and integrity violations. Unfortunately, existing manual protections are incomplete and ad-… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  4. arXiv:2109.05366  [pdf, other

    cs.DC

    A readahead prefetcher for GPU file system layer

    Authors: Vasilis Dimitsas, Mark Silberstein

    Abstract: GPUs are broadly used in I/O-intensive big data applications. Prior works demonstrate the benefits of using GPU-side file system layer, GPUfs, to improve the GPU performance and programmability in such workloads. However, GPUfs fails to provide high performance for a common I/O pattern where a GPU is used to process a whole data set sequentially. In this work, we propose a number of system-level o… ▽ More

    Submitted 11 September, 2021; originally announced September 2021.

  5. arXiv:2105.06872  [pdf, other

    cs.CR cs.AR

    Revizor: Testing Black-box CPUs against Speculation Contracts

    Authors: Oleksii Oleksenko, Christof Fetzer, Boris Köpf, Mark Silberstein

    Abstract: Speculative vulnerabilities such as Spectre and Meltdown expose speculative execution state that can be exploited to leak information across security domains via side-channels. Such vulnerabilities often stay undetected for a long time as we lack the tools for systematic testing of CPUs to find them. In this paper, we propose an approach to automatically detect microarchitectural information lea… ▽ More

    Submitted 8 February, 2022; v1 submitted 14 May, 2021; originally announced May 2021.

    Comments: Published in Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'22)

  6. arXiv:2002.07584  [pdf, ps, other

    cs.DC cs.LG cs.NI

    A Computational Approach to Packet Classification

    Authors: Alon Rashelbach, Ori Rottenstreich, Mark Silberstein

    Abstract: Multi-field packet classification is a crucial component in modern software-defined data center networks. To achieve high throughput and low latency, state-of-the-art algorithms strive to fit the rule lookup data structures into on-die caches; however, they do not scale well with the number of rules. We present a novel approach, NuevoMatch, which improves the memory scaling of existing methods. A… ▽ More

    Submitted 13 July, 2020; v1 submitted 10 February, 2020; originally announced February 2020.

    Comments: To appear in SIGCOMM 2020

  7. arXiv:1905.10311  [pdf, other

    cs.CR

    SpecFuzz: Bringing Spectre-type vulnerabilities to the surface

    Authors: Oleksii Oleksenko, Bohdan Trach, Mark Silberstein, Christof Fetzer

    Abstract: SpecFuzz is the first tool that enables dynamic testing for speculative execution vulnerabilities (e.g., Spectre). The key is a novel concept of speculation exposure: The program is instrumented to simulate speculative execution in software by forcefully executing the code paths that could be triggered due to mispredictions, thereby making the speculative memory accesses visible to integrity check… ▽ More

    Submitted 10 March, 2020; v1 submitted 24 May, 2019; originally announced May 2019.

    Comments: To appear in USENIX Security Symposium (2020)

  8. arXiv:1805.08506  [pdf, other

    cs.CR

    You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass

    Authors: Oleksii Oleksenko, Bohdan Trach, Tobias Reiher, Mark Silberstein, Christof Fetzer

    Abstract: A recent discovery of a new class of microarchitectural attacks called Spectre picked up the attention of the security community as these attacks can circumvent many traditional mechanisms of defense. One of the attacks---Bounds Check Bypass---can neither be efficiently solved on system nor architectural levels and requires changes in the application itself. So far, the proposed mitigations involv… ▽ More

    Submitted 10 October, 2018; v1 submitted 22 May, 2018; originally announced May 2018.

  9. arXiv:1805.08079  [pdf, other

    cs.LG cs.AI cs.NE stat.ML

    Faster Neural Network Training with Approximate Tensor Operations

    Authors: Menachem Adelman, Kfir Y. Levy, Ido Hakimi, Mark Silberstein

    Abstract: We propose a novel technique for faster deep neural network training which systematically applies sample-based approximation to the constituent tensor operations, i.e., matrix multiplications and convolutions. We introduce new sampling techniques, study their theoretical properties, and prove that they provide the same convergence guarantees when applied to SGD training. We apply approximate tenso… ▽ More

    Submitted 25 October, 2021; v1 submitted 21 May, 2018; originally announced May 2018.

    Comments: NeurIPS 2021 camera ready