2,522 research outputs found
BRISC-V emulator: a standalone, installation-free, browser-based teaching tool
Many computer organization and computer architecture classes have recently started adopting the RISC-V architecture as an alternative to proprietary RISC ISAs and architectures. Emulators are a common teaching tool used to introduce students to writing assembly. We present the BRISC-V (Boston University RISC-V) Emulator and teaching tool, a RISC-V emulator inspired by existing RISC and CISC emulators. The emulator is a web-based, pure javascript implementation meant to simplify deployment, as it does not require maintaining support for different operating systems or any installation. Here we present the workings, usage, and extensibility of the BRISC-V emulator.Published versio
CodeTrolley: Hardware-Assisted Control Flow Obfuscation
Many cybersecurity attacks rely on analyzing a binary executable to find
exploitable sections of code. Code obfuscation is used to prevent attackers
from reverse engineering these executables. In this work, we focus on control
flow obfuscation - a technique that prevents attackers from statically
determining which code segments are original, and which segments are added in
to confuse attackers. We propose a RISC-V-based hardware-assisted deobfuscation
technique that deobfuscates code at runtime based on a secret safely stored in
hardware, along with an LLVM compiler extension for obfuscating binaries.
Unlike conventional tools, our work does not rely on compiling
hard-to-reverse-engineer code, but on securing a secret key. As such, it can be
seen as a lightweight alternative to on-the-fly binary decryption.Comment: 2019 Boston Area Architecture Workshop (BARC'19
Code trolley: hardware-assisted control flow obfuscation
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables. In this work, we focus on control flow obfuscation - a technique that prevents attackers from statically determining which code segments are original, and which segments are added in to confuse attackers. We propose a RISC-V-based hardware-assisted deobfuscation technique that deobfuscates code at runtime based on a secret safely stored in hardware, along with an LLVM compiler extension for obfuscating binaries. Unlike conventional tools, our work does not rely on compiling hard-to-reverse-engineer code, but on securing a secret key. As such, it can be seen as a lightweight alternative to on-the-fly binary decryption.Published versio
Equation of State for Exclusion Statistics in a Harmonic Well
We consider the equations of state for systems of particles with exclusion
statistics in a harmonic well. Paradygmatic examples are noninteracting
particles obeying ideal fractional exclusion statistics placed in (i) a
harmonic well on a line, and (ii) a harmonic well in the Lowest Landau Level
(LLL) of an exterior magnetic field. We show their identity with (i) the
Calogero model and (ii) anyons in the LLL of an exterior magnetic field and in
a harmonic well.Comment: latex file, 11 page
Analytical theory for proton correlations in common water ice
We provide a fully analytical microscopic theory for the proton correlations
in water ice . We compute the full diffuse elastic neutron scattering
structure factor, which we find to be in excellent quantitative agreement with
Monte Carlo simulations. It is also in remarkable qualitative agreement with
experiment, in the absence of any fitting parameters. Our theory thus provides
a tractable analytical starting point to account for more delicate features of
the proton correlations in water ice. In addition, it directly determines an
effective field theory of water ice as a topological phase.Comment: 5 pages, 3 figure
- …