Patents by Inventor ASHISH VENKAT

ASHISH VENKAT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250117223
    Abstract: Disclosed are various approaches for bit-serial computing embedded in the DRAM subarray, leveraging the massive parallelism of DRAM row operations. The present disclosure discloses digital techniques that can outperform analog charge-sharing techniques. Digital techniques can use more area but support a wider range of computing primitives, and allow a sequence of logic operations to be performed at higher clock speeds, be-tween slower subarray row reads/writes. The present disclosure describes a range of bit-serial architectures, and evaluate raw performance as well as area and energy efficiency. Results show that the digital architecture demonstrates 20× speedup over CPU, 5× over GPU, and 1.7× over SIMDRAM, an analog architecture.
    Type: Application
    Filed: October 7, 2024
    Publication date: April 10, 2025
    Inventors: Kevin Skadron, Deyuan Guo, Farzana Ahmed Siddique, Lingxi Wu, Ashish Venkat
  • Patent number: 9135435
    Abstract: This disclosure is directed to binary translator driven program state relocation. In general, a device may protect vulnerable program functions by setting them as non-executable. If an attempt is made to execute a protected program function, the program may trap to a binary translator in the device that may be configured to relocate program state from what has already been established (e.g., on a stack register). Program state may include resources (e.g., memory locations) used by the program during the course of execution. The binary translator may then translate the program into an executable form based on the relocated program state, and may be executed accordingly. Intruding code that attempts to overcome normal program execution and implement hostile operations (e.g., based the program state that is reflected in the stack register) will not function as intended since the relocated program state will cause unexpected results.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: September 15, 2015
    Assignee: Intel Corporation
    Inventors: Ashish Venkat, Arvind Krishnaswamy, Koichi Yamada, Palanivelrajan Rajan Shanmugavelayutham
  • Publication number: 20140229717
    Abstract: This disclosure is directed to binary translator driven program state relocation. In general, a device may protect vulnerable program functions by setting them as non-executable. If an attempt is made to execute a protected program function, the program may trap to a binary translator in the device that may be configured to relocate program state from what has already been established (e.g., on a stack register). Program state may include resources (e.g., memory locations) used by the program during the course of execution. The binary translator may then translate the program into an executable form based on the relocated program state, and may be executed accordingly. Intruding code that attempts to overcome normal program execution and implement hostile operations (e.g., based the program state that is reflected in the stack register) will not function as intended since the relocated program state will cause unexpected results.
    Type: Application
    Filed: February 13, 2013
    Publication date: August 14, 2014
    Inventors: ASHISH VENKAT, Arvind Krishnaswamy, KOICHI YAMADA, PALANIVELRAJAN RAJAN SHANMUGAVELAYUTHAM