Douglas C. Burger - Austin TX, US Stephen W. Keckler - Austin TX, US Robert McDonald - Austin TX, US Lakshminarasimhan Sethumadhavan - Austin TX, US Franziska Roesner - Austin TX, US
Assignee:
Board of Regents, The University of Texas System - Austin TX
International Classification:
G06F 9/312 G06F 12/00
US Classification:
711154, 712220, 712E09033, 711E12001
Abstract:
A method and processor for providing full load/store queue functionality to an unordered load/store queue for a processor with out-of-order execution. Load and store instructions are inserted in a load/store queue in execution order. Each entry in the load/store queue includes an identification corresponding to a program order. Conflict detection in such an unordered load/store queue may be performed by searching a first CAM for all addresses that are the same or overlap with the address of the load or store instruction to be executed. A further search may be performed in a second CAM to identify those entries that are associated with younger or older instructions with respect to the sequence number of the load or store instruction to be executed. The output results of the Address CAM and Age CAM are logically ANDed.
Doug Burger - Austin TX, US Stephen W. Keckler - Austin TX, US Robert McDonald - Austin TX, US Lakshminarasimhan Sethumadhavan - New York NY, US Franziska Roesner - Austin TX, US
International Classification:
G06F 9/30
US Classification:
712216, 712E09016
Abstract:
Techniques related to dependence prediction for a memory system are generally described. Various implementations may include a predictor storage storing a value corresponding to at least one prediction type associated with at least one load operation, and a state-machine having multiple states. For example, the state-machine may determine whether to execute the load operation based upon a prediction type associated with each of the states and a corresponding precedent to the load operation for the associated prediction type. The state-machine may further determine the prediction type for a subsequent load operation based on a result of the load operation. The states of the state machine may correspond to prediction types, which may be a conservative prediction type, an aggressive prediction type, or one or more N-store prediction types, for example.
Franziska Roesner - Seattle WA, US Tadayoshi Kohno - Seattle WA, US Alexander Moshchuk - Kirkland WA, US Bryan J. Parno - Seattle WA, US Helen J. Wang - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 21/00 G06F 3/048
US Classification:
726 17, 715781
Abstract:
An access system is described herein which allows an application module to access a user-owned resource based on an indication of a user's intent to interact with the user-owned resource. For example, the application module can provide an application user interface which embeds a gadget associated with a particular user-owned resource. The access system can interpret the user's interaction with the gadget as conferring implicit permission to the application module to access the user-owned resource associated with the gadget. In addition, or alternatively, the user may make a telltale gesture in the course of interacting with the application module. The access system can interpret this gesture as conferring implicit permission to the application module to access a user-owned resource that is associated with the gesture.
Providing Intent-Based Access To User-Owned Resources
Franziska Roesner - Seattle WA, US Tadayoshi Kohno - Seattle WA, US Alexander Moshchuk - Kirkland WA, US Bryan J. Parno - Seattle WA, US Helen J. Wang - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 17
Abstract:
An access system is described herein which allows an application to access a system-level and/or application-specific user-owned resource based on a user's interaction with an intent-based access mechanism. For example, the intent-based access mechanism may correspond to a gadget that is embedded in an application user interface provided by the application, and/or logic for detecting a permission-granting input sequence. The access system accommodates different types of intent-based access mechanisms. One type is a scheduled intent-based access mechanism. Another type provides access to two or more user-owned resources. Further, the access system includes a mechanism for determining whether the application is permitted to use an intent-based access mechanism.
Techniques For Managing Multi-User Content In Augmented Reality Applications
- Seattle WA, US Tadayoshi Kohno - Seattle WA, US Franziska Roesner - Seattle WA, US
Assignee:
University of Washington - Seattle WA
International Classification:
G06T 11/60 G06T 11/00 G06F 21/60 G06F 21/62
Abstract:
In some embodiments, a method of providing visual cues for private virtual objects is provided. In response to determining that presentation of a protected characteristic of a virtual object is not permitted by an augmented reality system, the augmented reality system presents a placeholder object. In some embodiments, a method of protecting a location from undesirable virtual objects is provided. In response to determining that a location for a virtual object is associated with a protected location, a low-invasiveness version of a mesh of the virtual object is presented. In some embodiments, a method of decoupling a virtual object from a static physical location is provided.
Methods And Systems For Providing Presentation Security For Augmented Reality Applications
- Seattle WA, US Tadayoshi KOHNO - Seattle WA, US Franziska ROESNER - Seattle WA, US
Assignee:
University of Washington - Seattle WA
International Classification:
G09G 5/36 G06F 21/62 G09G 5/377
Abstract:
In some embodiments, an augmented reality system is provided that provides output security. In some embodiments, an operating system of the augmented reality system provides trusted management support for presenting virtual objects from untrusted applications executing in multiple isolated processes. With the output security mechanisms enabled, untrusted applications are still provided significant flexibility to create immersive AR experiences, but their presented content is constrained by the augmented reality system based on one or more output policies that are intended to reduce intrusiveness of virtual object presentations. Output policies may be composable, such that more than one output policy may be enforced on a given virtual object in a way that reduces intrusiveness of the presentation of the virtual object.
System And Method For Using Per-Application Profiles In A Computing Device
- Redmond WA, US Suman Kumar Nath - Redmond WA, US Temitope Oluwafemi - Seattle WA, US Franziska Roesner - Seattle WA, US Tadayoshi Kohno - Seattle WA, US
Assignee:
MICROSOFT TECHNOLOGY LICENSING, LLC - Redmond WA
International Classification:
H04L 29/06
Abstract:
Systems and methods for creating and managing per-application profiles are disclosed. A method may include receiving input designating at least a first profile policy and a second profile policy. At least a first application profile and a second application profile may be created based on the received first profile policy and the second profile policy. An application of the plurality of applications may be associated with both the first application profile and the second application profile. A first storage partition and a second storage partition may be created within a storage space of the computing device. The storage space may be associated with the application. The first storage partition may store application data while the application is running under the first application profile. The second storage partition may store application data while the application is running under the second application profile.
Managing Access By Applications To Perceptual Information
- Redmond WA, US Alan M. Dunn - Austin TX, US Suman Jana - San Jose CA, US Tadayoshi Kohno - Seattle WA, US Benjamin Livshits - Kirkland WA, US David A. Molnar - Seattle WA, US Alexander N. Moshchuk - Kirkland WA, US Eyal Ofek - Redmond WA, US Franziska Roesner - Seattle WA, US Timothy Scott Saponas - Woodinville WA, US Margus Veanes - Bellevue WA, US Jiahe Helen Wang - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06K 9/03 G06T 19/00 G06F 21/62 G06K 9/00
US Classification:
382209
Abstract:
Functionality is described herein by which plural environment-sensing applications capture information from an environment in a fine-grained and least-privileged manner. By doing so, the functionality reduces the risk that private information that appears within the environment will be released to unauthorized parties. Among other aspects, the functionality provides an error correction mechanism for reducing the incidence of false positives in the detection of objects, an offloading technique for delegating computationally intensive recognition tasks to a remote computing framework, and a visualization module by which a user may inspect the access rights to be granted (or already granted) to each application.
University of Washington - Seattle, WA since Sep 2009
PhD Student in Computer Science and Engineering
Google - Mountain View, CA May 2012 - Aug 2012
Software Engineering Intern
Collabera - Redmond, WA Oct 2010 - Oct 2011
Contracted Researcher at Microsoft Research
Microsoft - Redmond, WA Jun 2010 - Sep 2010
Microsoft Research Intern
Amazon.com - Seattle, WA Jun 2009 - Aug 2009
Security Engineering Intern
Education:
University of Washington 2009 - 2015
University of Washington 2009 - 2011
The University of Texas at Austin 2004 - 2008
News
Here's How To Track The Smartphone Apps That Are Tracking You
When applications ask for permissions, that is not really done in a manageable way, says Franziska Roesner, an assistant professor in computer science and engineering at the University of Washington, who researches computer security and privacy. iOS doesnt know necessarily whether its reasonabl