CASPER@Reading-Group

At CASPER, we value staying up-to-date with the latest research and developments in microarchitecture security and performance. To facilitate this, we have established a weekly reading group, where we engage in an in-depth discussion on relevant papers that have appeared at the top-tier/flagship architecture conferences like ISCA, MICRO, HPCA, ASPLOS, USENIX Security and S&P.Our reading group provides an opportunity for us to share our insights and knowledge on the latest research developments in the field. By discussing papers in a group setting, we are able to explore different perspectives and gain a deeper understanding of the topic at hand.We believe that staying informed through such weekly discussions helps us to remain at the forefront of our field. By staying up-to-date on emerging trends and developments in microarchitecture security and performance, we are better equipped to deliver top-quality work and come up with efficient solutions.Join us every week for an engaging and thought-provoking discussion on the latest research and developments in microarchitecture security and performance.

History

Papers presented in reading group @Spring '24 (Ongoing)

Conf@YearKeywords / CategoryTitleDOIPresenterDate
MICRO '17gpu securityConstructing and Characterizing Covert Channels on GPGPUsPaperShubhamSpring '24
MICRO '23tlb optimisationsVictima: Drastically Increasing Address Translation Reach by Leveraging Underutilized Cache ResourcesPaperAbhishekSpring '24
ISCA '23optimisations for recommendation systemsOptimizing CPU Performance for Recommendation Systems At-ScalePaperPrathameshSpring '24
HOST '23secure cache partitioningSCALE: Secure and Scalable Cache PartitioningPaperPrernaSpring '24
MICRO '183D V CacheFarewell My Shared LLC! A Case for Private Die-Stacked DRAM Caches for ServersPaperGirirajSpring '24
MICRO '18secure memory hierarchyTransient execution attacks and their mitigationsPaperNishkarshSpring '24
MICRO '99instruction prefetchingFetch directed instruction prefetchingPaperVedantSpring '24
ISCA '16cache replacement policyBack to the Future : Leveraging Belady's algotrithm for improved cache replacementPaperSwetaSpring '24
USENIX Security '24row hammer and its mitigationsSledgeHammer: Amplifying Rowhammer via Bank-level ParallelismPaperRaviSpring '24
HPCA '16data prefetchingBest offset data prefetcherPaperNamanSpring '24
MICRO '23RL for decision makingMicro-Armed Bandit: Lightweight & Reusable Reinforcement Learning for Microarchitecture Decision-MakingPaperKarthikSpring '24

Papers presented in reading group @Autumn '23

Conf@YearKeywords / CategoryTitleDOIPresenterDate
ISCA '22process fingerprintingThere's always a bigger fish: a clarifying analysis of a machine-learning-assisted side-channel attackPaperShubhamAutumn '23
ASPLOS '23agile and stealthy cache attacksHacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained TimersPaperKritheesh & JujhaarAutumn '23
MS Thesissecure hardware prefetchingDo not Forget Hardware Prefetching While Designing Secure Cache System~SumonAutumn '23
MICRO '23data prefetching for many core systemCLIP: Load Criticality based Data Prefetching for Bandwidth-constrained Many-core SystemsPaperBiswaAutumn '23
MICRO '22data prefetchingBerti: An Accurate Local-Delta Data PrefetcherPaperNamanAutumn '23
MICRO '21spectre mitigationGhostMinion: A Strictness-Ordered Cache System for Spectre MitigationPaperNishkarshAutumn '23
SEED '21secure LLC set partitioningBespoke Cache Enclaves: Fine-Grained and Scalable Isolation from Cache Side-Channels via Flexible Set-PartitioningPaperPrernaAutumn '23
ISCA '23replacement policy for instructions at L2CEMISSARY: Enhanced Miss Awareness Replacement Policy for L2 Instruction CachingPaperVedantAutumn '23

Papers presented in reading group @Spring '23

Conf@YearKeywords / CategoryTitleDOIPresenterDate
MICRO '21spectre mitigationGhostMinion: A Strictness-Ordered Cache System for Spectre MitigationPaperSumonSpring '23
ASPLOS '21side channel attack analysisStreamline: A Fast, Flushless Cache Covert-Channel Attack by Enabling Asynchronous CollusionPaperKritheeshSpring '23
USENIX Security '21cache randomizationMIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative DesignPaperAnubhav and NavneetSpring '23
ISCA '22website fingerprintingThere's always a bigger fish: a clarifying analysis of a machine-learning-assisted side-channel attackPaperGirish and PrajeetSpring '23
S&P '19spectre attacksSpectre Attacks: Exploiting Speculative ExecutionPaperShubhamSpring '23

logistics

As part of your presentation, make sure you cover the paper thoroughly. Try to encourage discussion on the paper while you present, making it interactive.To be part of the reading group, you can join the mailing list. Send a mail to [email protected]If you want to make a presentation, you can use the this template:For tips on presenting idea, check out these links : [LINK] [LINK]


Schedule

The next series of reading sessions will commence in Spring@2024.
The details of the next meeting will be sent through an e-mail.