- Parallel Computing and Optimization Techniques
- Low-power high-performance VLSI design
- Advanced Data Storage Technologies
- Interconnection Networks and Systems
- Embedded Systems Design Techniques
- Neutrino Physics Research
- Particle physics theoretical and experimental studies
- Dark Matter and Cosmic Phenomena
- Radiation Detection and Scintillator Technologies
- Advanced Malware Detection Techniques
- Astrophysics and Cosmic Phenomena
- Security and Verification in Computing
- Distributed systems and fault tolerance
- Physical Unclonable Functions (PUFs) and Hardware Security
- Atomic and Subatomic Physics Research
- Particle Detector Development and Performance
- Nuclear Physics and Applications
- Adversarial Robustness in Machine Learning
- Distributed and Parallel Computing Systems
- Ferroelectric and Negative Capacitance Devices
- Real-Time Systems Scheduling
- Cloud Computing and Resource Management
- Network Security and Intrusion Detection
- Nuclear reactor physics and engineering
- Data Management and Algorithms
Joint Institute for Nuclear Research
2015-2024
Binghamton University
2010-2024
All Russia Research Institute of Automatics
2023-2024
P.N. Lebedev Physical Institute of the Russian Academy of Sciences
2019-2024
Moscow Institute of Physics and Technology
2024
Dubna State University
2024
Moscow Engineering Physics Institute
2010-2024
University of California, Riverside
2024
Centre National de la Recherche Scientifique
2023
Université Claude Bernard Lyon 1
2023
DANSS is a highly segmented 1~m${}^3$ plastic scintillator detector. Its 2500 one meter long strips have Gd-loaded reflective cover. The detector placed under an industrial 3.1~$\mathrm{GW_{th}}$ reactor of the Kalinin Nuclear Power Plant 350~km NW from Moscow. distance to core varied on-line 10.7~m 12.7~m. building provides about 50~m water-equivalent shielding against cosmic background. detects almost 5000 $\widetilde\nu_e$ per day at closest position with background less than 3$\%$....
Security exploits and ensuant malware pose an increasing challenge to computing systems as the variety complexity of attacks continue increase. In response, software-based detection tools have grown in complexity, thus making it computationally difficult use them protect real-time. Therefore, software detectors are applied selectively at a low frequency, creating opportunities for remain undetected. this paper, we propose Malware-Aware Processors (MAP) - processors augmented with online...
The DANSS project is aimed at creating a relatively compact neutrino spectrometer which does not contain any flammable or other dangerous liquids and may therefore be located very close to the core of an industrial power reactor. As result, it expected that high flux would provide about 15,000 IBD interactions per day in detector with sensitive volume 1 m3. High segmentation plastic scintillator will allow suppress background down ∼1% level. Numerous tests performed simplified pilot...
Security exploits and ensuant malware pose an increasing challenge to computing systems as the variety complexity of attacks continue increase. In response, software-based detection tools have grown in complexity, thus making it computationally difficult use them protect real-time. Therefore, software detectors are applied selectively at a low frequency, creating opportunities for remain undetected. this paper, we propose Malware-Aware Processors (MAP) - processors augmented with...
The one-size-fits-all philosophy used for permanently allocating datapath resources in today's superscalar CPUs to maximize performance across a wide range of applications results the overcommitment general. To reduce power dissipation datapath, resource allocations can be dynamically adjusted based on demands applications. We propose mechanism dynamically, simultaneously and independently adjust sizes issue queue (IQ), reorder buffer (ROB) load/store (LSQ) periodic sampling their...
Modern superscalar processors implement precise interrupts by using the Reorder Buffer (ROB). In some microarchitectures , such as Intel P6, ROB also serves a repository for uncommitted results. these designs, is complex multi-ported structure that dissipates significant percentage of overall chip power. Recently, mechanism was introduced reducing complexity and its power dissipation through complete elimination read ports reading out source operands. The resulting performance degradation...
Covert channels present serious security threat because they allow secret communication between two malicious processes even if the system inhibits direct communication. We describe, implement and quantify a new covert channel through shared hardware random number generation (RNG) module that is available on modern processors. demonstrate reliable, high-capacity low-error can be created RNG works across CPU cores virtual machines. capacity of under different settings show transmission rates...
Hardware Malware Detectors (HMDs) have recently been proposed as a defense against the proliferation of malware. These detectors use low-level features, that can be collected by hardware performance monitoring units on modern CPUs to detect malware computational anomaly. Several aspects detector construction explored, leading with high accuracy. In this paper, we explore question how well evasive avoid detection HMDs. We show existing HMDs effectively reverse-engineered and subsequently...
The $\ensuremath{\nu}\mathrm{GeN}$ experiment is aimed to investigate neutrino properties using antineutrinos from the reactor of Kalinin Nuclear Power Plant. experimental setup located at about 11 meters center 3.1 ${\mathrm{GW}}_{\mathrm{th}}$ core. Scattering detected with low energy threshold high purity germanium detector. Passive and active shieldings are used suppress all kinds backgrounds coming surrounding materials cosmic radiation. description together first results presented....
Abstract The future Ricochet experiment aims at searching for new physics in the electroweak sector by providing a high precision measurement of Coherent Elastic Neutrino-Nucleus Scattering (CENNS) process down to sub-100 eV nuclear recoil energy range. will deploy kg-scale low-energy-threshold detector array combining Ge and Zn target crystals 8.8 m away from 58 MW research reactor core Institut Laue Langevin (ILL) Grenoble, France. Currently, Collaboration is characterizing backgrounds its...
Abstract The future Ricochet experiment aims to search for new physics in the electroweak sector by measuring Coherent Elastic Neutrino-Nucleus Scattering process from reactor antineutrinos with high precision down sub-100 eV nuclear recoil energy range. While collaboration is currently building experimental setup at site, it also finalizing cryogenic detector arrays that will be integrated into cryostat Institut Laue Langevin early 2024. In this paper, we report on recent progress Ge...
A large percentage of computed results have fewer significant bits compared to the full width a register. We exploit this fact pack multiple into single physical register reduce pressure on file in superscalar processor. Two schemes for dynamically packing "narrow-width" partitions within are evaluated. The first scheme is conservative and allocates full-width result. If result turns out be narrow, reallocated common register, freeing up second based prediction reallocates when actual higher...
Hardware-based malware detectors (HMDs) are a promising new approach to defend against malware. HMDs collect low-level architectural features and use them classify from normal programs. With simple hardware support, can be always on, operating as first line of defense that prioritizes the application more expensive accurate software-detector. In this paper, our goal is increase accuracy HMDs, improve detection, reduce overhead. We specialized targeted towards specific type detection each...
The "one-size-fits-all" philosophy used for permanently allocating datapath resources in today's superscalar CPUs to maximize performance across a wide range of applications results the overcommitment general. To reduce power dissipation datapath, resource allocations can be dynamically adjusted based on demands applications. We propose mechanism dynamically, simultaneously and independently adjust sizes issue queue (IQ), reorder buffer (ROB) load/store (LSQ) periodic sampling their...
Modern superscalar microprocessors need sizable register files to support large number of in-flight instructions for exploiting ILP. An alternative building is use smaller registers, but manage them more effectively. More efficient management registers can also result in higher performance if the reduction file size not goal. Traditional mechanisms deallocate a physical only when next instruction with same destination architectural commits. We propose two complementary techniques...
The out-of-order issue queue (IQ), used in modern superscalar processors is a considerable source of energy dissipation. We consider design alternatives that result significant reductions the power dissipation IQ (by as much 75%) through use comparators dissipate mainly on tag match, 0-B encoding operands to imply presence bytes with all zeros and, bitline segmentation. Our results are validated by execution SPEC 95 benchmarks true hardware level, cycle-by-cycle simulator for processor and...
Modern superscalar datapaths use aggressive execution reordering to exploit instruction-level parallelism. Comparators, either explicit or embedded into content-addressable logic, are used extensively throughout such designs implement several key out-of-order mechanisms and support the memory hierarchy. The traditional comparator dissipate energy on a mismatch in any bit position. As mismatches occur with much higher frequency than matches many situations, considerable improvements...
Hardware Malware Detectors (HMDs) have recently been proposed to make systems more malware-resistant. HMDs use hardware features detect malware as a computational anomaly. Several aspects of the detector construction explored, leading detectors with high accuracy. In this article, we explore whether developers can modify avoid detection. We show that existing be effectively reverse-engineered and subsequently evaded. Next, retraining using evasive would help is limited. To address these...
The "one-size-fits-all" philosophy used for permanently allocating datapath resources in today's superscalar CPUs to maximize performance across a wide range of applications results the overcommitment general. To reduce power dissipation datapath, resource allocations can be dynamically adjusted based on demands applications. We propose mechanism dynamically, simultaneously, and independently adjust sizes issue queue (IQ), reorder buffer (ROB), load/store (LSQ) periodic sampling their...
In some of today's superscalar processors (e.g.the Pentium III), the result repositories are implemented as Reorder Buffer (ROB) slots. such designs, ROB is a complex multi-ported structure that occupies significant portion die area and dissipates non-trivial fraction total chip power, much 27% according to estimates. addition, an access typically takes more than one cycle, impacting IPC adversely.We propose low-complexity low-power design exploits fact bulk source operand values obtained...