Logo: to the web site of Uppsala University

uu.sePublications from Uppsala University
Change search
Link to record
Permanent link

Direct link
Publications (10 of 17) Show all publications
Sakalis, C., Kaxiras, S. & Sjalander, M. (2022). Delay-on-Squash: Stopping Microarchitectural Replay Attacks in Their Tracks. ACM Transactions on Architecture and Code Optimization (TACO), 20(1), Article ID 9.
Open this publication in new window or tab >>Delay-on-Squash: Stopping Microarchitectural Replay Attacks in Their Tracks
2022 (English)In: ACM Transactions on Architecture and Code Optimization (TACO), ISSN 1544-3566, E-ISSN 1544-3973, Vol. 20, no 1, article id 9Article in journal (Refereed) Published
Abstract [en]

MicroScope and other similar microarchitectural replay attacks take advantage of the characteristics of speculative execution to trap the execution of the victim application in a loop, enabling the attacker to amplify a side-channel attack by executing it indefinitely. Due to the nature of the replay, it can be used to effectively attack software that are shielded against replay, even under conditions where a side-channel attack would not be possible (e.g., in secure enclaves). At the same time, unlike speculative side-channel attacks, microarchitectural replay attacks can be used to amplify the correct path of execution, rendering many existing speculative side-channel defenses ineffective. In this work, we generalize microarchitectural replay attacks beyond MicroScope and present an efficient defense against them. We make the observation that such attacks rely on repeated squashes of so-called "replay handles" and that the instructions causing the side-channel must reside in the same reorder buffer window as the handles. We propose Delay-on-Squash, a hardware-only technique for tracking squashed instructions and preventing them from being replayed by speculative replay handles. Our evaluation shows that it is possible to achieve full security against microarchitectural replay attacks with very modest hardware requirements while still maintaining 97% of the insecure baseline performance.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022
Keywords
Microarchitecture, side-channels, security, replay attacks
National Category
Computer Sciences
Identifiers
urn:nbn:se:uu:diva-501608 (URN)10.1145/3563695 (DOI)000934935100009 ()
Funder
Swedish Research Council, 2015-05159Swedish Research Council, 2018-05254
Available from: 2023-05-10 Created: 2023-05-10 Last updated: 2023-05-10Bibliographically approved
Sakalis, C., Chowdhury, Z. I., Wadle, S., Akturk, I., Ros, A., Själander, M., . . . Karpuzcu, U. R. (2021). Do Not Predict – Recompute!: How Value Recomputation Can Truly Boost the Performance of Invisible Speculation. In: 2021 International Symposium on Secure and Private Execution Environment Design (SEED): . Paper presented at 2021 International Symposium on Secure and Private Execution Environment Design (SEED), Online, September 20-21, 2021 (pp. 89-100). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Do Not Predict – Recompute!: How Value Recomputation Can Truly Boost the Performance of Invisible Speculation
Show others...
2021 (English)In: 2021 International Symposium on Secure and Private Execution Environment Design (SEED), Institute of Electrical and Electronics Engineers (IEEE), 2021, p. 89-100Conference paper, Published paper (Refereed)
Abstract [en]

Recent architectural approaches that address speculative side-channel attacks aim to prevent software from exposing the microarchitectural state changes of transient execution. The Delay-on-Miss technique is one such approach, which simply delays loads that miss in the L1 cache until they become non-speculative, resulting in no transient changes in the memory hierarchy.  However, this costs performance, prompting the use of value prediction (VP) to regain some of the delay.

However, the problem cannot be solved by simply introducing a new kind of speculation (value prediction). Value-predicted loads have to be validated, which cannot be commenced until the load becomes non-speculative. Thus, value-predicted loads occupy the same amount of precious core resources (e.g., reorder buffer entries) as Delay-on-Miss. The end result is that VP only yields marginal benefits over Delay-on-Miss.

In this paper, our insight is that we can achieve the same goal as VP (increasing performance by providing the value of loads that miss) without incurring its negative side-effect (delaying the release of precious resources), if we can safely, non-speculatively, recompute a value in isolation (without being seen from the outside), so that we do not expose any information by transferring such a value via the memory hierarchy. Value Recomputation, which trades computation for data transfer was previously proposed in an entirely different context: to reduce energy-expensive data transfers in the memory hierarchy. In this paper, we demonstrate the potential of value recomputation in relation to the Delay-on-Miss approach of hiding speculation, discuss the trade-offs, and show that we can achieve the same level of security, reaching 93% of the unsecured baseline performance (5% higher than Delay-on-miss), and exceeding (by 3%) what even an oracular (100% accuracy and coverage) value predictor could do.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
National Category
Computer Engineering
Identifiers
urn:nbn:se:uu:diva-453758 (URN)10.1109/SEED51797.2021.00021 (DOI)000799181700013 ()978-1-6654-2025-9 (ISBN)
Conference
2021 International Symposium on Secure and Private Execution Environment Design (SEED), Online, September 20-21, 2021
Funder
Swedish Research Council, 2015-05159Swedish Research Council, 2018-05254
Available from: 2021-09-22 Created: 2021-09-22 Last updated: 2022-06-28Bibliographically approved
Aimoniotis, P., Sakalis, C., Sjalander, M. & Kaxiras, S. (2021). Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions. IEEE COMPUTER ARCHITECTURE LETTERS, 20(2), 162-165
Open this publication in new window or tab >>Reorder Buffer Contention: A Forward Speculative Interference Attack for Speculation Invariant Instructions
2021 (English)In: IEEE COMPUTER ARCHITECTURE LETTERS, ISSN 1556-6056, Vol. 20, no 2, p. 162-165Article in journal (Refereed) Published
Abstract [en]

Speculative side-channel attacks access sensitive data and use transmitters to leak the data during wrong-path execution. Various defenses have been proposed to prevent such information leakage. However, not all speculatively executed instructions are unsafe: Recent work demonstrates that speculation invariantinstructions are independent of speculative control-flow paths and are guaranteed to eventually commit, regardless of the speculation outcome. Compile-time information coupled with run-time mechanisms can then selectively lift defenses for speculation invariant instructions, reclaiming some of the lost performance. Unfortunately, speculation invariant instructions can easily be manipulated by a form of speculative interference to leak information via a new side-channel that we introduce in this paper. We show that forward speculative interference where older speculative instructions interfere with younger speculation invariant instructions effectively turns them into transmitters for secret data accessed during speculation. We demonstrate forward speculative interference on actual hardware, by selectively filling the reorder buffer (ROB) with instructions, pushing speculative invariant instructions in-or-out of the ROB on demand, based on a speculatively accessed secret. This reveals the speculatively accessed secret, as the occupancy of the ROB itself becomes a new speculative side-channel.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE)Institute of Electrical and Electronics Engineers (IEEE), 2021
Keywords
Interference, Transmitters, Hardware, Microarchitecture, Delays, Side-channel attacks, Program processors, Speculative side-channel attacks, security, spectre, speculative interference
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:uu:diva-460204 (URN)10.1109/LCA.2021.3123408 (DOI)000720514300001 ()
Funder
Swedish Research Council, 2015-05159Swedish Research Council, 2018-05254
Available from: 2022-01-12 Created: 2022-01-12 Last updated: 2025-09-10Bibliographically approved
Sakalis, C. (2021). Rethinking Speculative Execution from a Security Perspective. (Doctoral dissertation). Uppsala: Acta Universitatis Upsaliensis
Open this publication in new window or tab >>Rethinking Speculative Execution from a Security Perspective
2021 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Speculative out-of-order execution is one of the fundamental building blocks of modern, high-performance processors. To maximize the utilization of the system's resources, hardware and software security checks in the speculative domain can be temporarily ignored, without affecting the correctness of the application, as long as no architectural changes are made before transitioning to the non-speculative domain. Similarly, the microarchitectural state of the system, which is by necessity modified for every single operation (speculative or otherwise) also does not affect the correctness of the application, as such state is meant to be invisible on the architectural level. Unfortunately, while the microarchitectural state of the system is indeed separate from the architectural state and is typically hidden from the users, it can still be observed indirectly through its side-effects, through the use of "side-channels". Starting with Meltdown and Spectre, speculative execution, combined with existing side-channel attacks, can be abused to bypass both hardware and software security barriers and illegally gain access to data that would not be accessible otherwise.

Embroiled in a battle between security and efficiency, computer architects have designed numerous microarchitectural solutions to this issue, all the while new attacks are being constantly discovered. This thesis proposes two such speculative side-channel defenses, Ghost loads and Delay-on-Miss, both of which protect against speculative side-channel attacks targeting the cache and memory hierarchy as their side-channel. Ghost loads work by making speculative loads invisible in the memory hierarchy, while Delay-on-Miss, which is both simpler and more secure than Ghost loads, restricts speculative loads from even reaching many levels of the hierarchy.

At the same time, this thesis also tackles security problems brought on by speculative execution that are not themselves speculative side-channel attacks, namely microarchitectural replay attacks. In the latter, the attacker abuses speculative execution not to gain access to data but to amplify an otherwise already existing side-channel. This is achieved by trapping the execution of a victim application in a repeating window of speculation, forcing it to constantly squash and re-execute the same side-channel instructions again and again. To counter such attacks, Delay-on-Squash is introduced, which prevents instructions from being replayed in the same window of speculation, hence stopping any microarchitectural replay attempts.

Overall, between Delay-on-Squash, Delay-on-Miss, and Ghost loads, this thesis covers a wide range of insecure microarchitectural behaviors and secure countermeasures for them, all the while balancing the trade-offs between security, performance, and complexity.

Place, publisher, year, edition, pages
Uppsala: Acta Universitatis Upsaliensis, 2021. p. 43
Series
Digital Comprehensive Summaries of Uppsala Dissertations from the Faculty of Science and Technology, ISSN 1651-6214 ; 2089
Keywords
computer architecture, speculative execution, processor, security, out-of-order execution, side-channel, microarchitectural replay, microarchitecture, Delay-on-Miss, Ghosts, Delay-on-Squash
National Category
Computer Sciences Computer Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:uu:diva-456244 (URN)978-91-513-1333-7 (ISBN)
Public defence
2021-12-17, Room 2347, ITC, Lägerhyddsvägen 2, Uppsala, 10:15 (English)
Opponent
Supervisors
Funder
Swedish Research Council, 2015-05159
Available from: 2021-11-25 Created: 2021-10-15 Last updated: 2021-12-29
Sakalis, C., Själander, M. & Kaxiras, S. (2021). Seeds of SEED: Preventing Priority Inversion in Instruction Scheduling to Disrupt Speculative Interference. In: 2021 International Symposium on Secure and Private Execution Environment Design (SEED): . Paper presented at 2021 International Symposium on Secure and Private Execution Environment Design (SEED), Online, September 20-21, 2021 (pp. 101-107). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Seeds of SEED: Preventing Priority Inversion in Instruction Scheduling to Disrupt Speculative Interference
2021 (English)In: 2021 International Symposium on Secure and Private Execution Environment Design (SEED), Institute of Electrical and Electronics Engineers (IEEE), 2021, p. 101-107Conference paper, Published paper (Refereed)
Abstract [en]

Speculative side-channel attacks consist of two parts: The speculative instructions that abuse speculative execution to gain illegal access to sensitive data and the side-channel instructions that leak the sensitive data. Typically, the side-channel instructions are assumed to follow the speculative instructions and be dependent on them. Speculative side-channel defenses have taken advantage of these facts to construct solutions where speculative execution is limited only under the presence of these conditions, in an effort to limit the performance overheads introduced by the defense mechanisms. 

Unfortunately, it turns out that only focusing on dependent instructions enables a new set of attacks, referred to as "speculative interference attacks". These are a new variant of speculative side-channel attacks, where the side-channel instructions are placed before the point of misspeculation and hence before any illegal speculative instructions. As this breaks the previous assumptions on how speculative side-channel attacks work, this new attack variant can be used to bypass many of the existing defenses. 

We argue that the root cause of speculative interference is a priority inversion between the scheduling of older, bound to be committed, and younger, bound to be squashed instructions, which affects the execution order of the former. This priority inversion can be caused by affecting either the readiness of a not-yet-ready older instruction or the issuing priority of an older instruction after it becomes ready. We disrupt the opportunity for speculative interference by ensuring that current defenses adequately prevent the interference of younger instructions with the availability of operands to older instructions and by proposing an instruction scheduling policy to preserve the priority of ready instructions. As a proof of concept, we also demonstrate how the prevention of scheduling-priority inversion can safeguard a specific defense, Delay-on-Miss, from the possibility of speculative interference attacks. We first discuss why it is susceptible to interference attacks and how this can be corrected without introducing any additional performance costs or hardware complexity, with simple instruction scheduling rules. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
National Category
Computer Engineering
Identifiers
urn:nbn:se:uu:diva-453755 (URN)10.1109/SEED51797.2021.00022 (DOI)000799181700014 ()978-1-6654-2025-9 (ISBN)
Conference
2021 International Symposium on Secure and Private Execution Environment Design (SEED), Online, September 20-21, 2021
Funder
Swedish Research Council, 2015-05159Swedish Research Council, 2018-05254
Available from: 2021-09-22 Created: 2021-09-22 Last updated: 2022-06-28Bibliographically approved
Jose Gomez-Hernandez, E., Shao, R., Sakalis, C., Kaxiras, S. & Ros, A. (2021). Splash-4: Improving Scalability with Lock-Free Constructs. In: 2021 IEEE International Symposium On Performance Analysis Of Systems And Software (ISPASS 2021): . Paper presented at 2021 IEEE International Symposium On Performance Analysis Of Systems And Software (ISPASS 2021), Stony Brook, NY, USA, 28-30 March 2021 (pp. 235-236). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Splash-4: Improving Scalability with Lock-Free Constructs
Show others...
2021 (English)In: 2021 IEEE International Symposium On Performance Analysis Of Systems And Software (ISPASS 2021), Institute of Electrical and Electronics Engineers (IEEE), 2021, p. 235-236Conference paper, Published paper (Refereed)
Abstract [en]

Over the past three decades, the parallel applications of the Splash-2 benchmark suite have been instrumental in advancing multiprocessor research. Recently, the Splash-3 benchmarks eliminated performance bugs, data races, and improper synchronization that plagued Splash-2 benchmarks after the definition of the C memory model. In this work, we revisit the Splash-3 benchmarks and adapt them for contemporary architectures with atomic operations and lock-free constructs. With our changes, we improve the scalability of most benchmarks for up to 32 and 64 cores, showing an improvement of up to 9x in actual machines, and up to 5x in simulation, over the unmodified Splash-3 benchmarks. To denote the substantive nature of the improvements in the Splash-3 benchmarks and to re-introduce them in contemporary research, we refer to the new collection as Splash-4.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2021
Keywords
Benchmarks, simulation, synchronization, atomic operations, optimization
National Category
Computer Sciences
Identifiers
urn:nbn:se:uu:diva-452776 (URN)10.1109/ISPASS51385.2021.00044 (DOI)000672618800033 ()
Conference
2021 IEEE International Symposium On Performance Analysis Of Systems And Software (ISPASS 2021), Stony Brook, NY, USA, 28-30 March 2021
Funder
EU, Horizon 2020, 819134
Available from: 2021-09-13 Created: 2021-09-13 Last updated: 2021-09-13Bibliographically approved
Tran, K.-A., Sakalis, C., Själander, M., Ros, A., Kaxiras, S. & Jimborean, A. (2020). Clearing the Shadows: Recovering Lost Performance for Invisible Speculative Execution through HW/SW Co-Design. In: PACT ’20: Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques. Paper presented at PACT '20:International Conference on Parallel Architectures and Compilation Techniques, Virtual Event GA USA, October 3 - 7, 2020 (pp. 241-254). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Clearing the Shadows: Recovering Lost Performance for Invisible Speculative Execution through HW/SW Co-Design
Show others...
2020 (English)In: PACT ’20: Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques, Association for Computing Machinery (ACM) , 2020, p. 241-254Conference paper, Published paper (Refereed)
Abstract [en]

Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructions to bypass other slower instructions in order to fully utilize the processor's resources. Speculatively executed instructions do not affect the correctness of the application, as they never change the architectural state, but they do affect the micro-architectural behavior of the system. Until recently, these changes were considered to be safe but with the discovery of new security attacks that misuse speculative execution to leak secrete information through observable micro-architectural changes (so called side-channels), this is no longer the case. To solve this issue, a wave of software and hardware mitigations have been proposed, the majority of which delay and/or hide speculative execution until it is deemed to be safe, trading performance for security. These newly enforced restrictions change how speculation is applied and where the performance bottlenecks appear, forcing us to rethink how we design and optimize both the hardware and the software.

We observe that many of the state-of-the-art hardware solutions targeting memory systems operate on a common scheme: the visible execution of loads or their dependents is blocked until they become safe to execute. In this work we propose a generally applicable hardware-software extension that focuses on removing the causes of loads' unsafety, generally caused by control and memory dependence speculation. As a result, we manage to make more loads safe to execute at an early stage, which enables us to schedule more loads at a time to overlap their delays and improve performance. We apply our techniques on the state-of-the-art Delay-on-Miss hardware defense and show that we reduce the performance gap to the unsafe baseline by 53% (on average).

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2020
Series
International Conference on Parallel Architectures and Compilation Techniques, ISSN 1089-795X
Keywords
speculative execution, side-channel attacks, caches, compiler, in- struction reordering, coherence protocoL
National Category
Computer Engineering
Identifiers
urn:nbn:se:uu:diva-428516 (URN)10.1145/3410463.3414640 (DOI)000723645400023 ()978-1-4503-8075-1 (ISBN)
Conference
PACT '20:International Conference on Parallel Architectures and Compilation Techniques, Virtual Event GA USA, October 3 - 7, 2020
Funder
Swedish Research Council, 2015-05159Swedish Research Council, 2016-05086Swedish Research Council, 2018-05254EU, Horizon 2020, 819134
Available from: 2020-12-14 Created: 2020-12-14 Last updated: 2021-12-21Bibliographically approved
Sakalis, C., Jimborean, A., Kaxiras, S. & Själander, M. (2020). Evaluating the Potential Applications of Quaternary Logic for Approximate Computing. ACM Journal on Emerging Technologies in Computing Systems, 16(1), Article ID 5.
Open this publication in new window or tab >>Evaluating the Potential Applications of Quaternary Logic for Approximate Computing
2020 (English)In: ACM Journal on Emerging Technologies in Computing Systems, ISSN 1550-4832, E-ISSN 1550-4840, Vol. 16, no 1, article id 5Article in journal (Refereed) Published
Abstract [en]

There exist extensive ongoing research efforts on emerging atomic-scale technologies that have the potential to become an alternative to today’s complementary metal--oxide--semiconductor technologies. A common feature among the investigated technologies is that of multi-level devices, particularly the possibility of implementing quaternary logic gates and memory cells. However, for such multi-level devices to be used reliably, an increase in energy dissipation and operation time is required. Building on the principle of approximate computing, we present a set of combinational logic circuits and memory based on multi-level logic gates in which we can trade reliability against energy efficiency. Keeping the energy and timing constraints constant, important data are encoded in a more robust binary format while error-tolerant data are encoded in a quaternary format. We analyze the behavior of the logic circuits when exposed to transient errors caused as a side effect of this encoding. We also evaluate the potential benefit of the logic circuits and memory by embedding them in a conventional computer system on which we execute jpeg, sobel, and blackscholes approximately. We demonstrate that blackscholes is not suitable for such a system and explain why. However, we also achieve dynamic energy reductions of 10% and 13% for jpeg and sobel, respectively, and improve execution time by 38% for sobel, while maintaining adequate output quality.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2020
Keywords
approximate computing, quaternary
National Category
Computer Systems
Research subject
Computer Systems Sciences
Identifiers
urn:nbn:se:uu:diva-396028 (URN)10.1145/3359620 (DOI)000535717000005 ()
Funder
Swedish Research Council, 2015-05159Swedish National Infrastructure for Computing (SNIC)
Available from: 2019-10-29 Created: 2019-10-29 Last updated: 2024-02-21Bibliographically approved
Sakalis, C. (2020). Securing the Memory Hierarchy from Speculative Side-Channel Attack. (Licentiate dissertation). Uppsala: Uppsala University
Open this publication in new window or tab >>Securing the Memory Hierarchy from Speculative Side-Channel Attack
2020 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high performance while also remaining energy efficient. However, with the introduction of Meltdown and Spectre in the beginning of 2018, speculative execution has been under attack. These exploits, and the many that followed, take advantage of the unchecked nature of speculative execution and the microarchitectural changes it causes in order to mount speculative side-channel attacks. Such attacks can bypass software and hardware barriers and gain access to sensitive information while remaining invisible to the application. In this thesis we will describe our work on preventing speculative side-channel attacks that exploit the memory hierarchy as their side-channel. Specifically, we will discuss two different approaches, one were we do not restrict speculative execution but try to keep its microarchitectural side-effects hidden, and one where we delay speculative memory accesses if we determine that they might lead to information leakage. We will discuss the advantages and disadvantages of both approaches, compare them against other state-of-the-art solutions, and show that it is possible to achieve secure, invisible speculation while at the same time maintaining high performance and efficiency.

Place, publisher, year, edition, pages
Uppsala: Uppsala University, 2020. p. 128
Series
Information technology licentiate theses: Licentiate theses from the Department of Information Technology, ISSN 1404-5117 ; 2020-003
National Category
Computer Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:uu:diva-403547 (URN)
Presentation
(English)
Opponent
Supervisors
Funder
Swedish Research Council, 2015-05159
Available from: 2020-02-19 Created: 2020-01-30 Last updated: 2020-02-19Bibliographically approved
Sakalis, C., Kaxiras, S., Ros, A., Jimborean, A. & Själander, M. (2020). Understanding Selective Delay as a Method for Efficient Secure Speculative Execution. IEEE Transactions on Computers, 69(11), 1584-1595
Open this publication in new window or tab >>Understanding Selective Delay as a Method for Efficient Secure Speculative Execution
Show others...
2020 (English)In: IEEE Transactions on Computers, ISSN 0018-9340, E-ISSN 1557-9956, Vol. 69, no 11, p. 1584-1595Article in journal (Refereed) Published
Abstract [en]

Since the introduction of Meltdown and Spectre, the research community has been tirelessly working on speculative side-channel attacks and on how to shield computer systems from them. To ensure that a system is protected not only from all the currently known attacks but also from future, yet to be discovered, attacks, the solutions developed need to be general in nature, covering a wide array of system components, while at the same time keeping the performance, energy, area, and implementation complexity costs at a minimum. One such solution is our own delay-on-miss, which efficiently protects the memory hierarchy by i) selectively delaying speculative load instructions and ii) utilizing value prediction as an invisible form of speculation. In this article we dive deeper into delay-on-miss, offering insights into why and how it affects the performance of the system. We also reevaluate value prediction as an invisible form of speculation. Specifically, we focus on the implications that delaying memory loads has in the memory level parallelism of the system and how this affects the value predictor and the overall performance of the system. We present new, updated results but more importantly, we also offer deeper insight into why delay-on-miss works so well and what this means for the future of secure speculative execution.

Keywords
Speculative execution, side-channel attacks, memory, security
National Category
Computer Systems
Identifiers
urn:nbn:se:uu:diva-404312 (URN)10.1109/TC.2020.3014456 (DOI)000576255400003 ()
Funder
Swedish Research Council, 2015-05159Swedish Foundation for Strategic Research , SM17-0064European Regional Development Fund (ERDF), RTI2018098156-B-C53Swedish National Infrastructure for Computing (SNIC)
Available from: 2020-02-17 Created: 2020-02-17 Last updated: 2023-03-28Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-4172-8607

Search in DiVA

Show all publications