Wow, I just admire how he exploit problems and uses it to generate new innovations. There is an opportunity for the next BIG THING.
@muhammadgamal9071
2 жыл бұрын
I cannot find a word to describe my gratitude for your generosity that is more precise and definitive than thank you professor.
@runggp
Жыл бұрын
really can feel the energy of prof Onur Mutlu which makes the lectures so fun and motivational!
@feribabahir
3 жыл бұрын
Dear Onur Mutlu thank you very much for the relevant, educational, and interesting Lectures. I am a IT-lawyer and I enjoy very much your lectures.
@Redaxi
11 ай бұрын
Hocam bilkentte 2. sınıf cs öğrencisiyim cs223 dersim için bu serinizi izliyorum çok teşekkürler çok net ve güzel anlatmışsınız gerçekten.
@Oingoboingo710
4 жыл бұрын
We're waiting for the new lecture professor Onur! Thank you so much.
@JonMasters
3 жыл бұрын
Thanks for the shoutout to our video on Meltdown and Spectre! I gave a long form lecture on it for FOSDEM 2018 as the keynote also
@Tracks777
4 жыл бұрын
awesome content
@saikashyapkurella8299
Жыл бұрын
Great initiative to share the amazing knowledge you have. Thank you very much Professor!! :)
@LuffyGearSecond2
3 жыл бұрын
Thanks from Mexico, your lectures are great!
@gitgudsec
Жыл бұрын
You are an incredible teacher, I love this so much ❤
@tiger4086
2 жыл бұрын
interesting lecture!!!
@dwein008
3 жыл бұрын
Thanks from Colombia.
@ervaucher
3 жыл бұрын
Dear Onur Mutlu, First of all, thank you for your amazing content. Just a speculative question about speculative execution and Spectre attacks. I couldn't find the answer anywhere in the documentation. Wouldn't it be possible to defend these kinds of attacks by measuring to an infinitely precise level the time needed to execute a particular program given a particular set of inputs and to consider any significant deviation from this timing as a potential sign of an attack ? I assume that a considerable Spectre attack would require a certain amount of conditional branches to be executed in order to fetch valuable information, and given this that the time deviation from the standard execution would be visible (as long as we work with extremely precise timings and that we control almost every parameter of the execution). If it is a current area of research, would you be so kind to provide links to sources describing these "timing" defence mechanisms ? Sincerely yours, Elliot.
@JonMasters
3 жыл бұрын
Rowhammer on CXL would be interesting - hopefully everyone has working ECC
@YosseufHassan
6 ай бұрын
Amazing how much content you put here for free, but is there any prerequistes before seeing this course? like electrical knowledge?
@isthereanyname
3 жыл бұрын
very good on the attacks
@areejahmad3998
2 жыл бұрын
where can i watch lab video?
@ramiadel5589
4 жыл бұрын
جامد
@lancelotrampaculan2075
2 жыл бұрын
At what year level are his students? anyone knows?
@TheFalsoblanco
2 жыл бұрын
How do the labs look like ?
@minhtoannguyen1862
2 жыл бұрын
1:04:30
@TheFalsoblanco
3 жыл бұрын
Why is not a solution for Row Hamering just go back and do what we did in 2008-2010 with seperated cell are the trade offs so terrible that this solution sounds so unlikeable?
@giorgosK936
Жыл бұрын
speed
@umutcagatay5597
Жыл бұрын
Because it requires much more space than it ever had so we wouldn't have devices which are as little-sized as mobile phones that fits in our pockets. Also it decreases the speed and performance which are the most significiant demands in technology science rn.
Пікірлер: 26