Software & Hardware Foundation

group_project

Visible to the public SHF: Medium: PRISM: Platform for Rapid Investigation of efficient Scientific-computing & Machine-learning

Today's systems demand acceleration in processing and learning using massive datasets. Unfortunately, because of poor energy scaling and power limits, performance and power improvements due to technology scaling and instruction level parallelism in general-purpose processors have ended. It is well known that full custom, application-specific hardware accelerators can provide orders-of-magnitude improvements in energy/op for a variety of application domains.

group_project

Visible to the public SHF: Medium: Collaborative Research: Building Critical Systems with Verifiable Properties Using Gate Level Analysis

Computer performance has doubled many times over during the past 40 years, but the very techniques used to achieve these performance gains have made it increasingly difficult to build systems that are provably safe, secure, or reliable. This fact significantly impedes progress in the development of our most safety-critical embedded systems such as those found in medical, avionic, automotive, and military systems.

group_project

Visible to the public SHF: Small: Towards Obfuscation-Resilient Software Plagiarism Detection

Software plagiarism is an act of reusing someone else's code, in whole or in part, into one own program in a way violating the terms of original license. Along with the rapid developing software industry and the burst of open source projects, software plagiarism has become a very serious threat to Intellectual Property Protection and the "healthiness" of the open-source-embracing software industry.

group_project

Visible to the public SHF: Small: Higher-order Contracts for Distributed Applications

Distributed applications (such as web applications and cloud-based applications, where multiple computers cooperate to run the application) are becoming increasingly common. Given the amount of commercial activity and information handled by these distributed applications, it is important that these applications are correct, reliable, and efficient. However, many traditional tools and techniques for programmers cannot be used for distributed applications, making it difficult for programmers to write and debug distributed applications.

group_project

Visible to the public Workshop on Formal Methods for Security (November 2015)

This aim of this workshop is to identify existing successes and opportunities for applying formal methods to security problems, and raise awareness of these opportunities in relevant communities, including academia, industry, and government research labs. The workshop will bring together researchers from academia, industry, and government research labs that are working in the areas of security and formal methods, and researchers currently applying formal methods to security problems.