asmodeus isaac sheff the dwarf
play

Asmodeus Isaac Sheff The Dwarf @ . isheff@cs.cornell.edu - PowerPoint PPT Presentation

I SAAC S HEFF BEYOND OPTIMAL: COMPILER BLACK MAGIC BASED ON EQUIVALENT EXCHANGE BEYOND OPTIMAL Asmodeus Isaac Sheff The Dwarf @ . isheff@cs.cornell.edu the flask BACKGROUND COMPILERS SOURCE


  1. I SAAC S HEFF BEYOND OPTIMAL: 
 COMPILER BLACK MAGIC BASED ON EQUIVALENT EXCHANGE

  2. BEYOND OPTIMAL Asmodeus Isaac Sheff “The Dwarf” ♑ ❦ ⏣ @ ♈ ♒♈♊ . ☿♆ isheff@cs.cornell.edu “the flask”

  3. BACKGROUND COMPILERS SOURCE EXEC ASM LEX TRANSLATE Tokens LINK IL PARSE OPTIMIZE AST attr. AST CODE SEMANTIC ANALYSIS GEN

  4. BACKGROUND OPTIMIZE ▸ Unroll Loops ▸ Remove dead code ▸ End-tail recursion

  5. BACKGROUND OPTIMIZE ▸ Unroll Loops ▸ Remove dead code ▸ End-tail recursion ▸ “Super” optimize

  6. BACKGROUND CONSTRAINTS ▸ Semantics ▸ Runtime ▸ limited super optimization ▸ Composability ▸ limits whole-program analysis ▸ Target Hardware ▸ limited operations

  7. BACKGROUND CONSTRAINTS ▸ Math

  8. BACKGROUND PROVIDENCE, 2012 ▸ Student Disappearances ▸ Abandoned Tunnel ▸ Basement of University Hall

  9. BACKGROUND PROVIDENCE, 2012 ▸ Bricked up within building’s walls ▸ Bound in human skin ▸ Aura of corruption ▸ Obscure and forbidding 
 runes

  10. BACKGROUND PROVIDENCE, 2012 ▸ sacrifice the blood of the innocent for both efficiency and security ▸ 3 human hearts ▸ 2 pounds flesh ▸ Extract of Nightshade ▸ Aura of Pestilence ▸ Stone carved with Elder Sign ▸ Defiled altar of the Elder Gods ▸ 1 goat

  11. BACKGROUND PROVIDENCE, 2012 Elliptic RSA Group/Field Curve encrypt & operations ▸ Edward Tremel, The Council of operations decrypt Shadows et al. — SigSEGV, 2014 Impossibly Source optimized assembly of True arithmetic Random Chaos of the Abyss

  12. BACKGROUND PROVIDENCE, 2012 ▸ Edward Tremel, The Council of Shadows et al. — SigSEGV, 2014 Cryptography operations 12 10 8 Total time (ms) Best current implementation 6 Prototype CBC implementation 4 2 0 RSA Sign RSA Verify Group multiply Group pairing

  13. BACKGROUND PROVIDENCE, 2012 ▸ Edward Tremel, The Council of Shadows et al. — SigSEGV, 2014 ▸ “Tentacle Monster” ▸ Channel to Abyss may not be as stable as originally thought ▸ Chaos leaking into mortal plane ▸ Increased incidence of unholy monstrosities in Providence area

  14. BACKGROUND PROVIDENCE, 2012

  15. OBJECTIVE SAFE CROSS-PLANE OPTIMIZATION ▸ Infinite potential planes of existence ▸ the quantums

  16. OBJECTIVE SAFE CROSS-PLANE OPTIMIZATION ▸ Infinite potential planes of existence ▸ the quantums ▸ Ancient Theology

  17. OBJECTIVE SAFE CROSS-PLANE OPTIMIZATION ▸ Infinite potential planes of existence ▸ the quantums ▸ Ancient Theology ▸ Modern Mapping Techniques

  18. CONTRIBUTIONS EQUIVALENT EXCHANGE ▸ To obtain, something of equal value must be lost

  19. CONTRIBUTIONS EQUIVALENT EXCHANGE ▸ To obtain, something of equal value must be lost ▸ Equality determined by “God”

  20. CONTRIBUTIONS EQUIVALENT EXCHANGE ▸ To obtain, something of equal value must be lost ▸ Equality determined by “God” ▸ Constrains damage

  21. CONTRIBUTIONS TARGET LANGUAGE ▸ Alchemical symbols

  22. CONTRIBUTIONS TARGET LANGUAGE ▸ Alchemical symbols ▸ Some degree of specialized hardware required

  23. CONTRIBUTIONS RUNTIME SACRIFICE ▸ Sacrifices range from 10 kJoules 
 to 18,922 human souls ▸ Sacrifice value bounded 
 AT COMPILE TIME

  24. CONTRIBUTIONS BLOODSTONE ▸ Type-safe compiler with compile- time bounded runtime sacrifice ▸ True whole-program super- optimization possible with compile- time sacrifice

  25. RESULTS BLOODSTONE Performance 
 vs 
 Optimal souls

  26. CONTRIBUTIONS FUTURE WORK ▸ High-value sacrifice ▸ other than souls ▸ Decrease compile-time sacrifice

Recommend


More recommend