CS 290N Extra-Performance Computer Architecture

This course will focus on computer architecture design goals beyond performance. These include: security, reliability, low power, and sustainability.


Announcements


Time: TR 3-4:50
Room: Phelps 1401
Instructor: Prof. Fred Chong; office hours by appointment; Eng I 5113

Deadlines

  • Project Proposals due 10/12
  • Project Drafts due 11/21
  • Project final papers due 12/7

    Grading

  • Problem Sets 15%
  • Discussion Topics 20%
  • Project Proposals and Drafts 15%
  • Final Project Presentation 15%
  • Project Final Report 35%

    Discussion Information

  • Assign a paper for the class to read, one week before your discussion day.
  • Make up a short question/study guide based upon that paper and make it available one week before the discussion day. (You can find samples of this from this class).
  • Present the paper and supplemental material on your assigned day. Lead discussion, with our help, on the subject.

    Project Information

    Here is an example project paper. The project has two goals:
  • A critique of 3-5 related research papers. This is not a book report. Do not just summarize what is in the papers. Point out shortcomings and possible areas for extension.
  • Extension of the area. Address shortcomings or extend the work in the papers. Come up with some ideas and test them with a short project. This can be in the form of some simple analysis, simulations, algorithms, or models. Remember to pick something that will fit in a quarter.

    Project topic areas include:

  • Computing with unreliable components
  • Architectural support for security
  • Architectural support for software debugging/correctness
  • Low-power architectures
  • Environmentally-aware architectures

    Lectures


  • Lecture (Thu 9/28/06): Course organization, overview of topics
  • Lecture (Tue 10/3/06): Security Architectures -- dataflow tracking

    Reading: Jedidiah R. Crandall and Frederic T. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. International Symposium on Microarchitecture. Portland, Oregon. November 2004

  • Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)

    Supplemental reading: Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature Generation of Exploit Attacks on Commodity Software James Newsome and Dawn Song. In Network and Distributed Systems Security Symposium, Feb 2005.


  • Lecture (Thu 10/5/06): Security Architectures -- Security models and Aegis

    Reading: Why Cryptosystems Fail by R. Anderson, 1st Conference on Computer and Comm. Security '93

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)

    Supplemental reading: Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions, G. Edward Suh, Charles W. O'Donnell, Ishan Sachdev, and Srinivas Devadas, Proceedings of the 32nd Annual International Symposium on Computer Architecture


  • Lecture (Tue 10/10/06): Security Architectures -- reconfigurable computing

    Reading: Policy-Driven Memory Protection for Reconfigurable Hardware by T. Huffmire et al, ESORICS 2006

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Thu 10/12/06): Security - Code Integrity

    Reading: David Lie, Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, and Mark Horowitz.  Architectural Support for Copy and Tamper Resistant Software .  In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX).  November, 2000. (This paper discusses the XOM architecture in detail)

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)
  • Lecture (Tue 10/17/06): Security Architectures -- 3D Chip Profiling

    Reading

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Thu 10/19/06): Security Architectures -- Covert Channels

    Reading

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Tue 10/24/06): No Class (ASPLOS)
  • Lecture (Thu 10/26/06): No Class (IISWC)
  • Lecture (Tue 10/31/06): anomaly detection

    Reading

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Thu 11/2/06): Low power architectures -- parallelism and voltage scaling

    Reading

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Tue 11/7/06): Power management in mobile systems

    Energy-aware adaptation for mobile applications.

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Thu 11/9/06): Environmentally-aware architectures

    Reading

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Tue 11/14/06): Architectural view of soft errors (Architectural Vulnerability Factor, fault-masking by latches)

    Scaling of Architecture Level Soft Error Rate for Superscalar Processors

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Thu 11/16/06): Soft Error Detection

    REESE: A Method of Soft Error Detection in Microprocessor

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Tue 11/21/06): Guest Lecture -- error tolerant applications

    Reading

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Thu 11/23/06): No Class (Thanksgiving)
  • Lecture (Tue 11/28/06): Xen

    Reading

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Lecture (Thu 11/30/06): Network Processor Security

    Reading

    Problem Set (Please e-mail to chong@cs.ucsb.edu before class with "290N" in the subject line)


  • Final Projects (Tue 12/5/06): 30-minute presentations

    Susmit and Mohit

    Banit and Shashi

    Maria


  • Final Projects (Thu 12/7/06): 30-minute presentations

    Alan

    Bita and Fernando

    Eric and Nagy



    Last updated November 2006
    chong@cs.ucsb.edu