We introduce the first microarchitectural side channel attacks that leverage contention on the CPU ring interconnect.
Cryptography and Security Hardware Architecture
The key idea is to derive a smooth, differentiable approximation to the otherwise non-smooth, non-convex search space.
no code implementations • 22 Feb 2020 • Abdulrahman Mahmoud, Siva Kumar Sastry Hari, Christopher W. Fletcher, Sarita V. Adve, Charbel Sakr, Naresh Shanbhag, Pavlo Molchanov, Michael B. Sullivan, Timothy Tsai, Stephen W. Keckler
As Convolutional Neural Networks (CNNs) are increasingly being employed in safety-critical applications, it is important that they behave reliably in the face of hardware errors.
Morph further achieves a 15. 9x average energy reduction on 3D CNNs when compared to Eyeriss.
This paper studies how weight repetition ---when the same weight occurs multiple times in or across weight vectors--- can be exploited to save energy and improve performance during CNN inference.