The Cheriton School of Computer Science invites you to attend the 2023 Cheriton Research Symposium.
Learn, engage in discussion, and share findings聽at this showcase of research excellence made possible by David R. Cheriton鈥檚 generous investment in education.

This year鈥檚 symposium program consists of presentations by Cheriton Chairs聽Professors N. Asokan and Jimmy Lin, and , followed by 辫辞蝉迟别谤听辫谤别蝉别苍迟补迟颈辞苍蝉 by Cheriton School of Computer Science graduate students.
Schedule
Friday, October 6, 2023
Time | Event |
---|---|
9:30 a.m. | Raouf Boutaba, Director, Cheriton School of Computer Science 鈥⒙燚C 1302
Refreshments will be served |
9:40 a.m. 鈥 10:20 a.m. | N. Asokan, Professor, Cheriton School of Computer Science 鈥⒙燚C 1302
Outsourcing computing to a remote processor is popular and compelling. Cryptographic techniques like homomorphic encryption allow a client to outsource computation on sensitive data while ensuring that the data cannot be leaked. However, such techniques incur substantial computation and communication costs. Leveraging hardware assistance to efficiently ensure security is thus an attractive proposition. Trusted Execution Environments (TEEs), which saw widespread deployment in the early 2000s by mobile device manufacturers to run sensitive computations on commodity devices, can help to realize secure outsourced computing. But the security guarantees provided by traditional TEEs have been called into question by various recent attacks that exploit the inherent complexity of modern hardware and software. In this talk, I will describe Blinded Memory (BliMe): on-going work by my students to design minimal processor extensions that can help to efficiently realize secure outsourced computing. BliMe consists of a minimal set of Instruction Set Architecture (ISA) extensions that use taint-tracking to ensure confidentiality of sensitive (client) data even in the presence of server malware, run-time attacks, or side-channel attacks. To secure outsourced computation, BliMe extensions can be used together with an attestable, fixed-function hardware security module (HSM) and an encryption engine that provides atomic decrypt-and-taint and encrypt-and-untaint operations. I will describe the overall architecture, the current status of the work, and the challenges we face. Bio: N. Asokan聽holds a David R. Cheriton Chair and serves as the Executive Director of 蓝莓视频 Cybersecurity and Privacy Institute (CPI). Asokan鈥檚 primary research theme is systems security broadly, including topics like the development and use of novel platform security features, applying cryptographic techniques to design secure protocols for distributed systems, applying machine learning techniques to security/privacy problems, and understanding/addressing the security and privacy of machine learning applications themselves. For more information about Asokan鈥檚 work, 聽or follow him on . |
10:20 a.m. 鈥 11:00 a.m. | Jimmy Lin, Professor, Cheriton School of Computer Science 鈥⒙燚C 1302
Information access 鈥 the challenge of connecting users to previously stored information that is relevant to their needs 鈥 dates back millennia. The technologies have changed 鈥 from clay tablets stacked in granaries to books on shelves arranged according to the Dewey Decimal Classification to digital content indexed by web search engines 鈥 but the aims have not. Large language models (LLMs) such as OpenAI鈥檚 ChatGPT and GPT-4, Google鈥檚 Bard and Gemini, Meta鈥檚 Llama 2, as well as numerous open-source models, represent the latest innovations that can help tackle this challenge. Nevertheless, the shortcomings of LLMs are well known, including hallucinations, out-of-date information, and inability to access private data. In this talk, I鈥檒l share my perspectives on the future of search in the era of LLMs. I argue that 鈥渢raditional鈥 retrieval tasks, far from being obsolete, are now more important than ever, as retrieval augmentation forms the basis of addressing exactly those challenges mentioned above. In this context, I鈥檒l discuss how different techniques available today, such as sparse and dense retrieval models, contribute to the overall design of next-generation information access systems. Bio: Professor Jimmy Lin holds the David R. Cheriton Chair in the David R. Cheriton School of Computer Science at the University of 蓝莓视频. Lin received his PhD in Electrical Engineering and Computer Science from the Massachusetts Institute of Technology in 2004. For a quarter of a century, Lin鈥檚 research has been driven by the quest to develop methods and build tools that connect users to relevant information. His work mostly lies at the intersection of information retrieval and natural language processing, with a focus on two fundamental challenges: those of understanding and scale. He is a Fellow of the ACM and a member of the SIGIR Academy. |
11:00 a.m. 鈥 12:00 p.m. | David R. Cheriton, Professor of Computer Science, Emeritus, Stanford University 鈥⒙燚C 1302
Software design and implementation is the greatest challenge that humans have ever faced.聽Done right, it is over a million times faster, cheaper and better than manually performing the same task. Done wrong, it can be a disaster. The last 50 years has created a mountain of software that is unpredictable, and more is being created every day. Yet, a key goal of engineering is predictability. In this talk, I rail against unpredictable software (as a lonely warrior), particularly targeting parallel threads, and discuss a 鈥渟olution鈥 based on separate virtual address spaces, object-oriented programming and compiler-supported coroutine. |
12:00 p.m. 鈥 1:00 p.m. |
Lunch 鈥 DC 1301 By invitation |
1:00 p.m. 鈥 4:00 p.m. | Poster Session,聽Cheriton聽鈥婫raduate Students 鈥⒙DC Atrium See below |
4:00 p.m. 鈥 4:30 p.m. | Awards Ceremony 鈥⒙DC 1301
|