Skip to main content

Showing 1–11 of 11 results for author: Själander, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.07018  [pdf, other

    cs.CR cs.AR

    ShadowBinding: Realizing Effective Microarchitectures for In-Core Secure Speculation Schemes

    Authors: Amund Bergland Kvalsvik, Magnus Själander

    Abstract: Secure speculation schemes have shown great promise in the war against speculative side-channel attacks, and will be a key building block for developing secure, high-performance architectures moving forward. As the field matures, the need for rigorous microarchitectures, and corresponding performance and cost analysis, become critical for evaluating secure schemes and for enabling their future ado… ▽ More

    Submitted 9 April, 2025; originally announced April 2025.

  2. arXiv:2502.06588  [pdf, other

    cs.AR

    Optimizing Energy Efficiency in Subthreshold RISC-V Cores

    Authors: Asbjørn Djupdal, Magnus Själander, Magnus Jahre, Snorre Aunet, Trond Ytterdal

    Abstract: Our goal in this paper is to understand how to maximize energy efficiency when designing standard-ISA processor cores for subthreshold operation. We hence develop a custom subthreshold library and use it to synthesize the open-source RISC-V cores SERV, QERV, PicoRV32, Ibex, Rocket, and two variants of Vex, targeting a supply voltage of 300 mV in a commercial 130 nm process. SERV, QERV, and PicoRV3… ▽ More

    Submitted 10 February, 2025; originally announced February 2025.

  3. R-HLS: An IR for Dynamic High-Level Synthesis and Memory Disambiguation based on Regions and State Edges

    Authors: David Metz, Nico Reissmann, Magnus Själander

    Abstract: Dynamically scheduled hardware enables high-level synthesis (HLS) for applications with irregular control flow and latencies, which perform poorly with conventional statically scheduled approaches. Since dynamically scheduled hardware is inherently data flow based, it is beneficial to have an intermediate representation (IR) that captures the global data flow to enable easier transformations. Stat… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

    Comments: ICCAD 2024

  4. arXiv:2406.17811  [pdf, other

    cs.LG cs.AI cs.NE

    CATBench: A Compiler Autotuning Benchmarking Suite for Black-box Optimization

    Authors: Jacob O. Tørring, Carl Hvarfner, Luigi Nardi, Magnus Själander

    Abstract: Bayesian optimization is a powerful method for automating tuning of compilers. The complex landscape of autotuning provides a myriad of rarely considered structural challenges for black-box optimizers, and the lack of standardized benchmarks has limited the study of Bayesian optimization within the domain. To address this, we present CATBench, a comprehensive benchmarking suite that captures the c… ▽ More

    Submitted 8 April, 2025; v1 submitted 24 June, 2024; originally announced June 2024.

  5. arXiv:2109.10774  [pdf, other

    cs.CR cs.AR

    "It's a Trap!"-How Speculation Invariance Can Be Abused with Forward Speculative Interference

    Authors: Pavlos Aimoniotis, Christos Sakalis, Magnus Själander, Stefanos Kaxiras

    Abstract: Speculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariant instructions are independent of speculative control-flow paths and are guaranteed to eve… ▽ More

    Submitted 2 December, 2022; v1 submitted 22 September, 2021; originally announced September 2021.

    Comments: Presented at 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA-28) 2022 in "Best of CAL" session and IEEE International Symposium On Secure And Private Execution Enviroment Design (SEED) 2021. A version of this manuscript has been published in IEEE Computer Architecture Letters (CAL) 2021

  6. arXiv:2103.10692  [pdf, other

    cs.CR cs.AR

    Selectively Delaying Instructions to Prevent Microarchitectural Replay Attacks

    Authors: Christos Sakalis, Stefanos Kaxiras, Magnus Själander

    Abstract: MicroScope, and microarchitectural replay attacks in general, take advantage of the characteristics of speculative execution to trap the execution of the victim application in an infinite loop, enabling the attacker to amplify a side-channel attack by executing it indefinitely. Due to the nature of the replay, it can be used to effectively attack security critical trusted execution environments (s… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

    Comments: 13 pages, 5 figures

  7. On Value Recomputation to Accelerate Invisible Speculation

    Authors: Christos Sakalis, Zamshed I. Chowdhury, Shayne Wadle, Ismail Akturk, Alberto Ros, Magnus Själander, Stefanos Kaxiras, Ulya R. Karpuzcu

    Abstract: Recent architectural approaches that address speculative side-channel attacks aim to prevent software from exposing the microarchitectural state changes of transient execution. The Delay-on-Miss technique is one such approach, which simply delays loads that miss in the L1 cache until they become non-speculative, resulting in no transient changes in the memory hierarchy. However, this costs perform… ▽ More

    Submitted 22 February, 2021; originally announced February 2021.

  8. arXiv:1912.05848  [pdf, other

    cs.DC

    EPIC: An Energy-Efficient, High-Performance GPGPU Computing Research Infrastructure

    Authors: Magnus Själander, Magnus Jahre, Gunnar Tufte, Nico Reissmann

    Abstract: The pursuit of many research questions requires massive computational resources. State-of-the-art research in physical processes using simulations, the training of neural networks for deep learning, or the analysis of big data are all dependent on the availability of sufficient and performant computational resources. For such research, access to a high-performance computing infrastructure is indis… ▽ More

    Submitted 5 July, 2024; v1 submitted 12 December, 2019; originally announced December 2019.

  9. RVSDG: An Intermediate Representation for Optimizing Compilers

    Authors: Nico Reissmann, Jan Christian Meyer, Helge Bahmann, Magnus Själander

    Abstract: Intermediate Representations (IRs) are central to optimizing compilers as the way the program is represented may enhance or limit analyses and transformations. Suitable IRs focus on exposing the most relevant information and establish invariants that different compiler passes can rely on. While control-flow centric IRs appear to be a natural fit for imperative programming languages, analyses requi… ▽ More

    Submitted 17 March, 2020; v1 submitted 10 December, 2019; originally announced December 2019.

  10. Optimizing Bit-Serial Matrix Multiplication for Reconfigurable Computing

    Authors: Yaman Umuroglu, Davide Conficconi, Lahiru Rasnayake, Thomas B. Preusser, Magnus Sjalander

    Abstract: Matrix-matrix multiplication is a key computational kernel for numerous applications in science and engineering, with ample parallelism and data locality that lends itself well to high-performance implementations. Many matrix multiplication-dependent applications can use reduced-precision integer or fixed-point representations to increase their performance and energy efficiency while still offerin… ▽ More

    Submitted 11 June, 2019; v1 submitted 2 January, 2019; originally announced January 2019.

    Comments: Invited paper at ACM TRETS as extension of FPL'18 paper arXiv:1806.08862

  11. arXiv:1806.08862  [pdf, other

    cs.AR

    BISMO: A Scalable Bit-Serial Matrix Multiplication Overlay for Reconfigurable Computing

    Authors: Yaman Umuroglu, Lahiru Rasnayake, Magnus Sjalander

    Abstract: Matrix-matrix multiplication is a key computational kernel for numerous applications in science and engineering, with ample parallelism and data locality that lends itself well to high-performance implementations. Many matrix multiplication-dependent applications can use reduced-precision integer or fixed-point representations to increase their performance and energy efficiency while still offerin… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: To appear at FPL'18