default search action
Caroline Trippel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Daniel Mendoza, Francisco Romero, Caroline Trippel:
Model Selection for Latency-Critical Inference Serving. EuroSys 2024: 1016-1038 - [c18]Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel:
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time. SP 2024: 4200-4219 - [i17]Abhinav Lalwani, Lovish Chopra, Christopher Hahn, Caroline Trippel, Zhijing Jin, Mrinmaya Sachan:
NL2FOL: Translating Natural Language to First-Order Logic for Logical Fallacy Detection. CoRR abs/2405.02318 (2024) - [i16]Yao Hsiao, Nikos Nikoleris, Artem Khyzha, Dominic P. Mulligan, Gustavo Petri, Christopher W. Fletcher, Caroline Trippel:
RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification. CoRR abs/2409.19478 (2024) - 2023
- [c17]Matthias Cosler, Christopher Hahn, Daniel Mendoza, Frederik Schmitt, Caroline Trippel:
nl2spec: Interactively Translating Unstructured Natural Language to Temporal Logics with Large Language Models. CAV (2) 2023: 383-396 - [c16]Saranyu Chattopadhyay, Keerthikumara Devarajegowda, Bihan Zhao, Florian Lonsing, Brandon A. D'Agostino, Ioanna Vavelidou, Vijay Deep Bhatt, Sebastian Prebeck, Wolfgang Ecker, Caroline Trippel, Clark W. Barrett, Subhasish Mitra:
G-QED: Generalized QED Pre-silicon Verification beyond Non-Interfering Hardware Accelerators. DAC 2023: 1-6 - [i15]Matthias Cosler, Christopher Hahn, Daniel Mendoza, Frederik Schmitt, Caroline Trippel:
nl2spec: Interactively Translating Unstructured Natural Language to Temporal Logics with Large Language Models. CoRR abs/2303.04864 (2023) - [i14]Nicholas Mosier, Hamed Nemati, John C. Mitchell, Caroline Trippel:
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time. CoRR abs/2309.05174 (2023) - 2022
- [c15]Geet Sethi, Bilge Acun, Niket Agarwal, Christos Kozyrakis, Caroline Trippel, Carole-Jean Wu:
RecShard: statistical feature-based memory optimization for industry-scale neural recommendation. ASPLOS 2022: 344-358 - [c14]Nicholas Mosier, Hanna Lachnitt, Hamed Nemati, Caroline Trippel:
Axiomatic hardware-software contracts for security. ISCA 2022: 72-86 - [i13]Geet Sethi, Bilge Acun, Niket Agarwal, Christos Kozyrakis, Caroline Trippel, Carole-Jean Wu:
RecShard: Statistical Feature-Based Memory Optimization for Industry-Scale Neural Recommendation. CoRR abs/2201.10095 (2022) - [i12]Daniel Mendoza, Caroline Trippel:
Dynamic Network Adaptation at Inference. CoRR abs/2204.08400 (2022) - 2021
- [c13]Mark Wilkening, Udit Gupta, Samuel Hsia, Caroline Trippel, Carole-Jean Wu, David Brooks, Gu-Yeon Wei:
RecSSD: near data processing for solid state drive based recommendation inference. ASPLOS 2021: 717-729 - [c12]Deeksha Dangwal, Vincent T. Lee, Hyo Jin Kim, Tianwei Shen, Meghan Cowan, Rajvi Shah, Caroline Trippel, Brandon Reagen, Timothy Sherwood, Vasileios Balntas, Armin Alaghi, Eddy Ilg:
Mitigating Reverse Engineering Attacks on Local Feature Descriptors. BMVC 2021: 106 - [c11]Saranyu Chattopadhyay, Florian Lonsing, Luca Piccolboni, Deepraj Soni, Peng Wei, Xiaofan Zhang, Yuan Zhou, Luca P. Carloni, Deming Chen, Jason Cong, Ramesh Karri, Zhiru Zhang, Caroline Trippel, Clark W. Barrett, Subhasish Mitra:
Scaling Up Hardware Accelerator Verification using A-QED with Functional Decomposition. FMCAD 2021: 42-52 - [c10]Jose Rodrigo Sanchez Vicarte, Pradyumna Shome, Nandeeka Nayak, Caroline Trippel, Adam Morrison, David Kohlbrenner, Christopher W. Fletcher:
Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data. ISCA 2021: 347-360 - [c9]Yao Hsiao, Dominic P. Mulligan, Nikos Nikoleris, Gustavo Petri, Caroline Trippel:
Synthesizing Formal Models of Hardware from RTL for Efficient Verification of Memory Model Implementations. MICRO 2021: 679-694 - [c8]Kiwan Maeng, Shivam Bharuka, Isabel Gao, Mark C. Jeffrey, Vikram Saraph, Bor-Yiing Su, Caroline Trippel, Jiyan Yang, Mike Rabbat, Brandon Lucia, Carole-Jean Wu:
Understanding and Improving Failure Tolerant Training for Deep Learning Recommendation with Partial Recovery. MLSys 2021 - [c7]Meghan Cowan, Deeksha Dangwal, Armin Alaghi, Caroline Trippel, Vincent T. Lee, Brandon Reagen:
Porcupine: a synthesizing compiler for vectorized homomorphic encryption. PLDI 2021: 375-389 - [i11]Meghan Cowan, Deeksha Dangwal, Armin Alaghi, Caroline Trippel, Vincent T. Lee, Brandon Reagen:
Porcupine: A Synthesizing Compiler for Vectorized Homomorphic Encryption. CoRR abs/2101.07841 (2021) - [i10]Mark Wilkening, Udit Gupta, Samuel Hsia, Caroline Trippel, Carole-Jean Wu, David Brooks, Gu-Yeon Wei:
RecSSD: Near Data Processing for Solid State Drive Based Recommendation Inference. CoRR abs/2102.00075 (2021) - [i9]Deeksha Dangwal, Meghan Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, Caroline Trippel:
SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing. CoRR abs/2105.00378 (2021) - [i8]Deeksha Dangwal, Vincent T. Lee, Hyo Jin Kim, Tianwei Shen, Meghan Cowan, Rajvi Shah, Caroline Trippel, Brandon Reagen, Timothy Sherwood, Vasileios Balntas, Armin Alaghi, Eddy Ilg:
Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors. CoRR abs/2105.03812 (2021) - [i7]Saranyu Chattopadhyay, Florian Lonsing, Luca Piccolboni, Deepraj Soni, Peng Wei, Xiaofan Zhang, Yuan Zhou, Luca P. Carloni, Deming Chen, Jason Cong, Ramesh Karri, Zhiru Zhang, Caroline Trippel, Clark W. Barrett, Subhasish Mitra:
Scaling Up Hardware Accelerator Verification using A-QED with Functional Decomposition. CoRR abs/2108.06081 (2021) - [i6]Nicholas Mosier, Hanna Lachnitt, Hamed Nemati, Caroline Trippel:
Relational Models of Microarchitectures for Formal Security Analyses. CoRR abs/2112.10511 (2021) - 2020
- [c6]Naorin Hossain, Caroline Trippel, Margaret Martonosi:
TransForm: Formally Specifying Transistency Models and Synthesizing Enhanced Litmus Tests. ISCA 2020: 874-887 - [c5]Deeksha Dangwal, Meghan Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, Caroline Trippel:
SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing. HASP@MICRO 2020: 8:1-8:9 - [i5]Naorin Hossain, Caroline Trippel, Margaret Martonosi:
TransForm: Formally Specifying Transistency Models and Synthesizing Enhanced Litmus Tests. CoRR abs/2008.03578 (2020) - [i4]Kiwan Maeng, Shivam Bharuka, Isabel Gao, Mark C. Jeffrey, Vikram Saraph, Bor-Yiing Su, Caroline Trippel, Jiyan Yang, Mike Rabbat, Brandon Lucia, Carole-Jean Wu:
CPR: Understanding and Improving Failure Tolerant Training for Deep Learning Recommendation with Partial Recovery. CoRR abs/2011.02999 (2020)
2010 – 2019
- 2019
- [b1]Caroline Trippel:
Concurrency and Security Verification in Heterogeneous Parallel Systems. Princeton University, USA, 2019 - [j2]Caroline Trippel, Daniel Lustig, Margaret Martonosi:
Security Verification via Automatic Hardware-Aware Exploit Synthesis: The CheckMate Approach. IEEE Micro 39(3): 84-93 (2019) - 2018
- [j1]Caroline Trippel, Yatin A. Manerkar, Daniel Lustig, Michael Pellauer, Margaret Martonosi:
Full-Stack Memory Model Verification with TriCheck. IEEE Micro 38(3): 58-68 (2018) - [c4]Hongce Zhang, Caroline Trippel, Yatin A. Manerkar, Aarti Gupta, Margaret Martonosi, Sharad Malik:
ILA-MCM: Integrating Memory Consistency Models with Instruction-Level Abstractions for Heterogeneous System-on-Chip Verification. FMCAD 2018: 1-10 - [c3]Caroline Trippel, Daniel Lustig, Margaret Martonosi:
CheckMate: Automated Synthesis of Hardware Exploits and Security Litmus Tests. MICRO 2018: 947-960 - [i3]Caroline Trippel, Daniel Lustig, Margaret Martonosi:
MeltdownPrime and SpectrePrime: Automatically-Synthesized Attacks Exploiting Invalidation-Based Coherence Protocols. CoRR abs/1802.03802 (2018) - 2017
- [c2]Caroline Trippel, Yatin A. Manerkar, Daniel Lustig, Michael Pellauer, Margaret Martonosi:
TriCheck: Memory Model Verification at the Trisection of Software, Hardware, and ISA. ASPLOS 2017: 119-133 - 2016
- [i2]Caroline Trippel, Yatin A. Manerkar, Daniel Lustig, Michael Pellauer, Margaret Martonosi:
Exploring the Trisection of Software, Hardware, and ISA in Memory Model Design. CoRR abs/1608.07547 (2016) - [i1]Yatin A. Manerkar, Caroline Trippel, Daniel Lustig, Michael Pellauer, Margaret Martonosi:
Counterexamples and Proof Loophole for the C/C++ to POWER and ARMv7 Trailing-Sync Compiler Mappings. CoRR abs/1611.01507 (2016) - 2015
- [c1]Daniel Lustig, Caroline Trippel, Michael Pellauer, Margaret Martonosi:
ArMOR: defending against memory consistency model mismatches in heterogeneous architectures. ISCA 2015: 388-400
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 22:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint