In this thesis we explore methods for exploiting concurrency to improve the security and performance of computing systems. We put forth four proposals: the Concurrency Accelerator (ConcAcl), Record-and-Replay Safe (RnRSafe), ReplayConfusion, and ReplayEndurance. With ConcAcl we accelerate concurrency management operations by creating a dedicated layer that is programmed by supervisor software (e.g. Operating System kernels or multi-threading runtimes). This layer is provisioned with dedicated compute and memory resources which are replicated across all cores in a multi-core processor. ConcAcl hosts procedures which are designed to exploit this unique arrangement to accelerate synchronization-heavy operations that are critical for concurren...
For power and performance reasons, multicores have become the dominant microprocessor architecture. ...
The recent trend of multicore CPUs pushes for major changes in software development. Traditional sin...
Many real-time database applications arise in electronic financial services, safety-critical install...
Hardware security features need to strike a careful balance between design intrusiveness and complet...
Just as errors in sequential programs can lead to security exploits, errors in concurrent programs c...
Just as errors in sequential programs can lead to se-curity exploits, errors in concurrent programs ...
Record and deterministic Replay (RnR) is a primitive with many proposed applications in computer sys...
As computing hardware moves to multi-core systems, future software needs to be parallelized in order...
Different layers of the computer system, from the low-level hardware accelerators and networks-on-ch...
Computer intrusions are inevitable. When an intrusion happens, forensic analysis is critical to unde...
As transistor budgets grow enabling chip multi-core processors, adding hardware support to ensure th...
Thesis (Ph. D.)--University of Rochester. Dept. of Computer Science, 2011.Computer architects have e...
Clusters of shared-memory symmetric multiprocessors are increasingly used for high performance...
Many real-time database applications arise in electronic financial services, safety-critical install...
With the development of multi-core processors, concurrent programs are becoming more and more popula...
For power and performance reasons, multicores have become the dominant microprocessor architecture. ...
The recent trend of multicore CPUs pushes for major changes in software development. Traditional sin...
Many real-time database applications arise in electronic financial services, safety-critical install...
Hardware security features need to strike a careful balance between design intrusiveness and complet...
Just as errors in sequential programs can lead to security exploits, errors in concurrent programs c...
Just as errors in sequential programs can lead to se-curity exploits, errors in concurrent programs ...
Record and deterministic Replay (RnR) is a primitive with many proposed applications in computer sys...
As computing hardware moves to multi-core systems, future software needs to be parallelized in order...
Different layers of the computer system, from the low-level hardware accelerators and networks-on-ch...
Computer intrusions are inevitable. When an intrusion happens, forensic analysis is critical to unde...
As transistor budgets grow enabling chip multi-core processors, adding hardware support to ensure th...
Thesis (Ph. D.)--University of Rochester. Dept. of Computer Science, 2011.Computer architects have e...
Clusters of shared-memory symmetric multiprocessors are increasingly used for high performance...
Many real-time database applications arise in electronic financial services, safety-critical install...
With the development of multi-core processors, concurrent programs are becoming more and more popula...
For power and performance reasons, multicores have become the dominant microprocessor architecture. ...
The recent trend of multicore CPUs pushes for major changes in software development. Traditional sin...
Many real-time database applications arise in electronic financial services, safety-critical install...