2,302 research outputs found

    BRISC-V emulator: a standalone, installation-free, browser-based teaching tool

    Full text link
    Many computer organization and computer architecture classes have recently started adopting the RISC-V architecture as an alternative to proprietary RISC ISAs and architectures. Emulators are a common teaching tool used to introduce students to writing assembly. We present the BRISC-V (Boston University RISC-V) Emulator and teaching tool, a RISC-V emulator inspired by existing RISC and CISC emulators. The emulator is a web-based, pure javascript implementation meant to simplify deployment, as it does not require maintaining support for different operating systems or any installation. Here we present the workings, usage, and extensibility of the BRISC-V emulator.Published versio

    CodeTrolley: Hardware-Assisted Control Flow Obfuscation

    Full text link
    Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables. In this work, we focus on control flow obfuscation - a technique that prevents attackers from statically determining which code segments are original, and which segments are added in to confuse attackers. We propose a RISC-V-based hardware-assisted deobfuscation technique that deobfuscates code at runtime based on a secret safely stored in hardware, along with an LLVM compiler extension for obfuscating binaries. Unlike conventional tools, our work does not rely on compiling hard-to-reverse-engineer code, but on securing a secret key. As such, it can be seen as a lightweight alternative to on-the-fly binary decryption.Comment: 2019 Boston Area Architecture Workshop (BARC'19

    Code trolley: hardware-assisted control flow obfuscation

    Full text link
    Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables. In this work, we focus on control flow obfuscation - a technique that prevents attackers from statically determining which code segments are original, and which segments are added in to confuse attackers. We propose a RISC-V-based hardware-assisted deobfuscation technique that deobfuscates code at runtime based on a secret safely stored in hardware, along with an LLVM compiler extension for obfuscating binaries. Unlike conventional tools, our work does not rely on compiling hard-to-reverse-engineer code, but on securing a secret key. As such, it can be seen as a lightweight alternative to on-the-fly binary decryption.Published versio

    Equation of State for Exclusion Statistics in a Harmonic Well

    Full text link
    We consider the equations of state for systems of particles with exclusion statistics in a harmonic well. Paradygmatic examples are noninteracting particles obeying ideal fractional exclusion statistics placed in (i) a harmonic well on a line, and (ii) a harmonic well in the Lowest Landau Level (LLL) of an exterior magnetic field. We show their identity with (i) the Calogero model and (ii) anyons in the LLL of an exterior magnetic field and in a harmonic well.Comment: latex file, 11 page

    Analytical theory for proton correlations in common water ice IhI_h

    Full text link
    We provide a fully analytical microscopic theory for the proton correlations in water ice IhI_h. We compute the full diffuse elastic neutron scattering structure factor, which we find to be in excellent quantitative agreement with Monte Carlo simulations. It is also in remarkable qualitative agreement with experiment, in the absence of any fitting parameters. Our theory thus provides a tractable analytical starting point to account for more delicate features of the proton correlations in water ice. In addition, it directly determines an effective field theory of water ice as a topological phase.Comment: 5 pages, 3 figure
    • …
    corecore