Author's Latest Posts


Formally Verifying Data-Oblivious Behavior In HW Using Standard Property Checking Techniques


A technical paper titled “A Scalable Formal Verification Methodology for Data-Oblivious Hardware” was published by researchers at RPTU Kaiserslautern-Landau and Stanford University. Abstract: "The importance of preventing microarchitectural timing side channels in security-critical applications has surged in recent years. Constant-time programming has emerged as a best-practice technique... » read more

Hardware Platform For Evolving Robots


A technical paper titled “Practical hardware for evolvable robots” was published by researchers at University of York, Edinburgh Napier University, Vrije Universiteit Amsterdam, University of the West of England, and University of Sunderland. Abstract: "The evolutionary robotics field offers the possibility of autonomously generating robots that are adapted to desired tasks by iteratively... » read more

A Hierarchical Instruction Cache Tailored To Ultra-Low-Power Tightly-Coupled Processor Clusters


A technical paper titled “Scalable Hierarchical Instruction Cache for Ultra-Low-Power Processors Clusters” was published by researchers at University of Bologna, ETH Zurich, and GreenWaves Technologies. Abstract: "High Performance and Energy Efficiency are critical requirements for Internet of Things (IoT) end-nodes. Exploiting tightly-coupled clusters of programmable processors (CMPs) ha... » read more

SG2042 64-Core RISC-V CPU Versus Existing RISC-V HW And High Performance x86 CPUs


A technical paper titled “Is RISC-V ready for HPC prime-time: Evaluating the 64-core Sophon SG2042 RISC-V CPU” was published by researchers at University of Edinburgh. Abstract: "The Sophon SG2042 is the world's first commodity 64-core RISC-V CPU for high performance workloads and an important question is whether the SG2042 has the potential to encourage the HPC community to embrace RISC-... » read more

Formal Verification Of a Sequestered Encryption Architecture


A technical paper titled “Security Verification of Low-Trust Architectures” was published by researchers at Princeton University, University of Michigan, and Lafayette College. Abstract: "Low-trust architectures work on, from the viewpoint of software, always-encrypted data, and significantly reduce the amount of hardware trust to a small software-free enclave component. In this paper, we... » read more

DRAM Simulator For Evaluation of Memory System Design Changes (ETH Zurich)


A technical paper titled “Ramulator 2.0: A Modern, Modular, and Extensible DRAM Simulator” was published by researchers at ETH Zurich. Abstract: "We present Ramulator 2.0, a highly modular and extensible DRAM simulator that enables rapid and agile implementation and evaluation of design changes in the memory controller and DRAM to meet the increasing research effort in improving the perfo... » read more

Neuromorphic Artificial Synaptic Device Combining Memristor Arrays With Copper Iodide


A technical paper titled “Charge-Mediated Copper-Iodide-Based Artificial Synaptic Device with Ultrahigh Neuromorphic Efficacy” was published by researchers at University of Glasgow, City University of Hong Kong, and Hong Kong Metropolitan University. Abstract: "In the realm of artificial intelligence, ultrahigh-performance neuromorphic computing plays a significant role in executing multi... » read more

A Perovskite-Derivative Nickelate Offering More Durable, Sustainable Multi-Level Non-Volatile Phase Change Memory


A technical paper titled “Thermally Reentrant Crystalline Phase Change in Perovskite-Derivative Nickelate Enabling Reversible Switching of Room-Temperature Electrical Resistivity” was published by researchers at Tohoku University and University of Tsukuba. Abstract: "Reversible switching of room-temperature electrical resistivity due to crystal-amorphous transition is demonstrated in vari... » read more

EUVL: Extreme Ultraviolet Lithography Research, Development, And Manufacturing (NIST)


A special paper titled “Report from the Extreme Ultraviolet (EUV) Lithography Working Group Meeting: Current State, Needs, and Path Forwards” was published by researchers at National Institute of Standards and Technology (NIST). Abstract: "This is the report of a hybrid working group meeting held on April 25, 2023, at the National Institute of Standards and Technology (NIST) in Boulder, C... » read more

Automotive Intrusion Detection Methodologies (TU Denmark)


A new technical paper titled "Intrusion Detection in the Automotive Domain: A Comprehensive Review" was published by researchers at DTU Compute Technical University of Denmark Abstract "The automotive domain has realized amazing advancements in communication, connectivity, and automation— and at a breakneck pace. Such advancements come with ample benefits, such as the reduction of traffic... » read more

← Older posts Newer posts →