Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David K. Wittenberg is active.

Publication


Featured researches published by David K. Wittenberg.


international workshop on hybrid systems: computation and control | 2004

Rigorous Modeling of Hybrid Systems using Interval Arithmetic Constraints

Timothy J. Hickey; David K. Wittenberg

We provide a rigorous approach to modeling, simulating, and analyzing hybrid systems using CLP(F) (Constraint Logic Programming (Functions)) [14], a system which combines CLP (Constraint Language Programming) [21] with interval arithmetic [30]. We have implemented this system, and provide timing information. Because hybrid systems are often used to prove safety properties, it is critical to have a rigorous analysis. By using intervals throughout the system, we make it easier to include measurement errors in our models and to prove safety properties.


self-adaptive and self-organizing systems | 2012

Hardware Support for Safety Interlocks and Introspection

Udit Dhawan; Albert Kwon; Edin Kadric; Catalin Hritcu; Benjamin C. Pierce; Jonathan M. Smith; André DeHon; Gregory Malecha; Greg Morrisett; Thomas F. Knight; Andrew Sutherland; Tom Hawkins; Amanda Zyxnfryx; David K. Wittenberg; Peter Trei; Sumit Ray; Greg Sullivan

Hardware interlocks that enforce semantic invariants and allow fine-grained privilege separation can be built with reasonable costs given modern semiconductor technology. In the common error-free case, these mechanisms operate largely in parallel with the intended computation, monitoring the semantic intent of the computation on an operation-by-operation basis without sacrificing cycles to perform security checks. We specifically explore five mechanisms: (1) pointers with manifest bounds (fat pointers), (2) hardware types (atomic groups), (3) processor-supported authority, (4)authority-changing procedure calls (gates), and (5) programmable metadata validation and propagation (tags and dynamic tag management). These mechanisms allow the processor to continuously introspect on its operation, efficiently triggering software handlers on events that require logging, merit sophisticated inspection, or prompt adaptation. We present results from our prototype FPGA implementation of a processor that incorporates these mechanisms, quantifying the logic, memory, and latency requirements. We show that the dominant cost is the wider memory necessary to hold our metadata (the atomic groups and programmable tags), that the added logic resources make up less than 20% of the area of the processor, that the concurrent checks do not degrade processor cycle time, and that the tag cache is comparable to a small L1 data cache.


ieee international conference on technologies for homeland security | 2013

SAFE: A clean-slate architecture for secure systems

Silviu Chiricescu; André DeHon; Delphine Demange; Suraj Iyer; Aleksey Kliger; Greg Morrisett; Benjamin C. Pierce; Howard Reubenstein; Jonathan M. Smith; Gregory Sullivan; Arun Thomas; Jesse A. Tov; Christopher White; David K. Wittenberg

SAFE is a large-scale, clean-slate co-design project encompassing hardware architecture, programming languages, and operating systems. Funded by DARPA, the goal of SAFE is to create a secure computing system from the ground up. SAFE hardware provides memory safety, dynamic type checking, and native support for dynamic information flow control. The Breeze programming language leverages the security features of the underlying machine, and the “zero kernel” operating system avoids relying on any single privileged component for overall system security. The SAFE project is working towards formally verifying security properties of the runtime software. The SAFE system sets a new high-water mark for system security, allowing secure applications to be built on a solid foundation rather than on the inherently vulnerable conventional platforms available today.


VIEW'06 Proceedings of the 1st first visual information expert conference on Pixelization paradigm | 2006

Leveraging layout with dimensional stacking and pixelization to facilitate feature discovery and directed queries

John T. Langton; Astrid A. Prinz; David K. Wittenberg; Timothy J. Hickey

Pixelization is the simple yet powerful technique of mapping each element of some data set to a pixel in a 2D image. There are 2 primary characteristics of pixels that can be leveraged to impart information: 1. their color and color-related attributes (hue, saturation, etc.) and 2. their arrangement in the image. We have found that applying a dimensional stacking layout to pixelization uniquely facilitates feature discovery, informs and directs user queries, supports interactive data mining, and provides a means for exploratory analysis. In this paper we describe our approach and how it is being used to analyze multidimensional, multivariate neuroscience data.


principles and practice of constraint programming | 1999

Validated Constraint Compilation

Timothy J. Hickey; David K. Wittenberg

Inaccurate scientific computation is useless at best and dangerous at worst. We address several major sources of inaccuracy. Roundoff error is well known and there is a great deal of work on minimizing it [Act96,Tay97]. By using interval constraints, we don’t eliminate roundoff error, but we make it explicit, so each answer comes with a clear indication of its accuracy. Another source of error arises from misapplying an algorithm (e.g. starting the Newton method with a poor initial choice, or using a method in a case where it does not perform well). We propose a method for reducing the chance of numerical errors in scientific programming by casting the problem as the design of an appropriate constraint solving algorithm and then separating the algorithm design process into two steps.


ieee high performance extreme computing conference | 2016

PERFECT case studies demonstrating order of magnitude reduction in power consumption

David K. Wittenberg; Edin Kadric; André DeHon; Jonathan Edwards; Jeffrey Smith; Silviu Chiricescu

We propose three methods for reducing power consumption in high-performance FPGAs (field programmable gate arrays). We show that by using continuous hierarchy memory, lightweight checks, and lower chip voltage for near-threshold voltage computation, we can both reduce power consumption and increase reliability without a decrease in throughput. We have implemented these techniques in two different, realistic wide-area motion imagery algorithms on FPGAs. We demonstrated greatly improved performance/efficiency compared to two flight-tested platforms, getting up to a 250X reduction in power use (measured in giga operations per second per watt). This paper summarizes these two case studies.


ieee international conference on technologies for homeland security | 2015

Applied Vulnerability Detection System

Jeffrey Smith; Basil Krikeles; David K. Wittenberg; Mikael Taveniku

In [1], we presented a Vulnerability Detection System (VDS) that can detect emergent vulnerabilities in complex Cyber Physical Systems (CPS). It used the attackers point of view by collecting a target systems vulnerability information from varied sources, and populating a Attack Point (AP) database. From these APs, a Hierarchical Task Network generated the set of composite device-level attack scenarios. The VDS used Alloy [2] to reduce the cardinality of the generated space by evaluating the feasibility of each attack. This paper specializes prior research by submitting the generated prioritized list to an automotive-specific Attack Evaluation Process (AAEP). With a combination of simulation and vehicle instrumented real-time execution, the AAEP confirms each candidate attack. The AAEPs output is used as feedback to refine the Alloy model. VDS is designed to support short product release cycles. The AAEP separates domain-specific from domain-independent aspects so the VDS can be rapidly retargeted.


Archive | 1990

System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords

David K. Wittenberg; Jerrold Sol Leichter


the florida ai research society | 2004

Using Analytic CLP to Model and Analyze Hybrid Systems

Timothy J. Hickey; David K. Wittenberg


Archive | 2004

Clp(f) modeling of hybrid systems

Timothy J. Hickey; David K. Wittenberg

Collaboration


Dive into the David K. Wittenberg's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

André DeHon

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Edin Kadric

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jonathan M. Smith

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge