Search Results - "Dangwal, Deeksha"
-
1
Agile Hardware Development and Instrumentation With PyRTL
Published in IEEE MICRO (01-07-2020)“…Domain-specific architectures have emerged as a promising solution to meet growing technology demands but with this comes an urgent need to improve hardware…”
Get full text
Journal Article -
2
A System-Level Framework for Privacy
Published 01-01-2023“…Privacy in the digital age has become increasingly difficult to achieve. While there is consensus on the importance of building privacy into systems that deal…”
Get full text
Dissertation -
3
Trace Wringing for Program Trace Privacy
Published in IEEE MICRO (01-05-2020)“…A quantitative approach to optimizing computer systems requires a good understanding of how applications exercise a machine, and real program traces from…”
Get full text
Journal Article -
4
Charm: A Language for Closed-Form High-Level Architecture Modeling
Published in 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) (01-06-2018)“…As computer architecture continues to expand beyond software-agnostic microarchitecture to data center organization, reconfigurable logic, heterogeneous…”
Get full text
Conference Proceeding -
5
A pythonic approach for rapid hardware prototyping and instrumentation
Published in 2017 27th International Conference on Field Programmable Logic and Applications (FPL) (01-09-2017)“…We introduce PyRTL, a Python embedded hardware design language that helps concisely and precisely describe digital hardware structures. Rather than attempt to…”
Get full text
Conference Proceeding -
6
Context-Aware Privacy-Optimizing Address Tracing
Published in 2021 International Symposium on Secure and Private Execution Environment Design (SEED) (01-09-2021)“…Application tuning requires a coordinated effort across hardware and software to achieve optimized application performance. Execution traces offer unique…”
Get full text
Conference Proceeding -
7
SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing
Published 02-05-2021“…Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems…”
Get full text
Journal Article -
8
Porcupine: A Synthesizing Compiler for Vectorized Homomorphic Encryption
Published 19-01-2021“…Homomorphic encryption (HE) is a privacy-preserving technique that enables computation directly on encrypted data. Despite its promise, HE has seen limited use…”
Get full text
Journal Article -
9
Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors
Published 08-05-2021“…As autonomous driving and augmented reality evolve, a practical concern is data privacy. In particular, these applications rely on localization based on user…”
Get full text
Journal Article -
10
PyRTLMatrix: An Object-Oriented Hardware Design Pattern for Prototyping ML Accelerators
Published in 2019 2nd Workshop on Energy Efficient Machine Learning and Cognitive Computing for Embedded Applications (EMC2) (01-02-2019)“…As Machine Learning (ML) applications become pervasive and computer architects further integrate hardware support, the need to rapidly explore trade-offs…”
Get full text
Conference Proceeding