Arxiv:2012.02328V2 [Cs.LG] 26 Feb 2021

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:2012.02328V2 [Cs.LG] 26 Feb 2021 MLPerf Mobile Inference Benchmark † ‡ ‡ ‡ § Vijay Janapa Reddi* David Kanter Peter Mattson Jared Duke Thai Nguyen Ramesh Chukka ¶ ¶ || || Kenneth Shiring Koan-Sin Tan Mark Charlebois William Chou Mostafa El-Khamy** †† § Jungwook Hong** Michael Buch* Cindy Trinh Thomas Atta-fosu Fatih Cakir** ‡ ¶ ‡‡ Masoud Charkhabi Xiaodong Chen** Jimmy Chiang Dave Dexter ‡ §§ § †† Woncheol Heo Guenther Schmuelling Maryam Shabani Dylan Zika Abstract Consequently, mobile-device and chipset manufacturers are motivated to improve AI implementations. Support for MLPerf Mobile is the first industry-standard open- the technology is becoming common in nearly all mobile source mobile benchmark developed by industry members segments, from cost-optimized devices to premium phones. and academic researchers to allow performance/accuracy The many AI approaches range from purely software-based evaluation of mobile devices with different AI chips and techniques to hardware-supported machine learning that re- software stacks. The benchmark draws from the expertise lies on tightly coupled libraries. Seeing through the mist of of leading mobile-SoC vendors, ML-framework providers, competing solutions is difficult for mobile consumers. and model producers. In this paper, we motivate the drive to On the hardware front, laptops and smartphones have in- demystify mobile-AI performance and present MLPerf Mo- corporated application-specific integrated circuits (ASICs) bile’s design considerations, architecture, and implemen- to support AI in an energy-efficient manner. For machine tation. The benchmark comprises a suite of models that learning, this situation leads to custom hardware that ranges operate with standard data sets, quality metrics, and run from specialized instruction-set-architecture (ISA) exten- rules. For the first iteration, we developed an Android app sions on general-purpose CPUs to fixed-function acceler- to provide an “out-of-the-box” inference test for computer ators dedicated to efficient machine learning. Also, because vision and natural-language processing on mobile devices. mobile devices are complex, they incorporate a variety of MLPerf Mobile Inference also supports non-smartphone features to remain competitive, especially those that con- devices such as laptops and mobile PCs. As a whole, it serve battery life. can serve as a framework for integrating future models, The software front includes many code paths and AI for customizing quality-target thresholds to evaluate system infrastructures to satisfy the desire to efficiently support performance, for comparing software frameworks, and for machine-learning hardware. Most SoC vendors lean toward assessing heterogeneous-hardware capabilities for machine custom model compilation and deployment that integrates learning, all fairly and faithfully with reproducible results. tightly with the hardware. Examples include Google’s An- droid Neural Network API (NNAPI) [15], Intel’s Open- 1 Introduction VINO [5], MediaTek’s NeuroPilot [19], Qualcomm’s SNPE [23] and Samsung’s Exynos Neural Network SDK [21]. arXiv:2012.02328v2 [cs.LG] 26 Feb 2021 Mobile artificial-intelligence (AI) applications are in- These frameworks handle different numerical formats (e.g., creasingly important as AI technology becomes a critical FP32, FP16, and INT8) for execution, and they provide run- differentiator in smartphones, laptops, and other mobile de- time support for various machine-learning networks that vices. Many consumer applications benefit from AI: image best fit the application and platform. processing, voice processing, and text interpretation. It pro- Hardware and software support for mobile AI applica- vides state-of-the-art solutions to these tasks with a quality tions is becoming a differentiating capability, increasing that users will notice on their devices. More and more con- the need to make AI-performance evaluation transparent. sumers are employing such applications, and they expect OEMs, SoC vendors, and consumers benefit when mobile a high-quality experience—especially for applications with devices employ AI in ways they can see and compare. A video or audio interactivity. typical comparison point for smartphone makers and the *Harvard University †MLCommons ‡Google §Intel technical press, for example, is CPUs and GPUs, both of ¶MediaTek ||Qualcomm **Samsung ††ENS Paris-Saclay which have associated benchmarks [6]. Similarly, mobile- ‡‡Arm §§Microsoft AI performance can also benefit from benchmarks. 1 Quantifying AI performance is nontrivial, however. It layer is an abstraction that allows hardware vendors to op- is especially challenging because AI implementations come timize their implementations for neural networks. The app in a wide variety with differing capabilities. This variety, also has a presentation layer for wrapping the more techni- combined with a lack of software-interface standards, com- cal benchmark layers and the Load Generator (“LoadGen”) plicates the design of standard benchmarks. In edge de- [9]. MLPerf created the LoadGen [9] to allow representa- vices, the quality of the results is often highly specific to tive testing of different inference platforms and use cases each problem. In other words, the definition of high perfor- by generating inference requests in a pattern and measur- mance is often task specific. For interactive user devices, ing certain parameters (e.g., latency, throughput, or latency- latency is normally the preferred performance metric. For bounded throughput). MLPerf additionally offers a head- noninteractive ones, throughput is usually preferred. The less version of the mobile application that enables laptops implementation for each task can generally trade off neural- running non-mobile OSs to use the same benchmarks. network accuracy for lower latency. This tradeoff makes The first round of MLPerf Mobile submissions is com- choosing a benchmark suite’s accuracy threshold critical. plete [12]. Intel, MediaTek, Qualcomm, and Samsung To address these challenges, MLPerf (mlperf.org) takes participated in this round, and all passed the third-party- an open-source approach. It is a consortium of industry and validation requirement (i.e., reproducibility) for their re- academic organizations with shared interests, yielding col- sults. These results exhibit performance variations and lective expertise on neural-network models, data sets, and illustrate the wide range of hardware and software ap- submission rules to ensure the results are relevant to the in- proaches that vendors take to implement neural-network dustry and beneficial to consumers while being transparent models on mobile devices. They also highlight a crucial and reproducible. takeaway: measuring mobile-AI performance is challeng- The following are important principles that inform the ing but possible. It requires a deep understanding of the MLPerf Mobile benchmark: fragmented and heterogeneous mobile ecosystem as well as a strong commitment to fairness and reproducibility. • Measured performance should match the performance MLPerf Mobile is a step toward better benchmark trans- that end users perceive in commercial devices. We parency. want to prevent the benchmark from implementing special code beyond what these users generally em- 2 Benchmarking Challenges ploy. The mobile ecosystem is rife with hardware hetero- geneity, software fragmentation, developer options, deploy- • The benchmark’s neural-network models should ment scenarios, and OEM life cycles. Each by itself leads closely match typical mobile-device workloads. They to hardware-performance variability, but the combination should reflect real benefits to mobile-device users in makes AI benchmarking on mobile systems extremely dif- daily situations. ficult. Figure 1 shows the various constituents and explains the implementation options and challenges facing each one. • The models should represent diverse tasks. This ap- proach yields a challenging test that resists extensive 2.1 Hardware Heterogeneity domain-specific optimizations. Smartphones contain complex heterogeneous chipsets that provide many different compute units and accelerators. • Testing conditions should closely match the environ- Any or all of these components can aid in machine-learning ments in which mobile devices typically serve. Af- (ML) inference. As such, recognizing the variability of fected characteristics include ambient temperature, SoCs is crucial. battery power, and special performance modes that are A typical mobile system-on-a-chip (SoC) complex in- software adjustable. cludes a CPU cluster, GPU, DSP, neural processing unit • All benchmark submissions should undergo third- (NPU), Hexagon Tensor Accelerator (HTA), Hexagon Vec- party validation. Since mobile devices are ubiquitous, tor Extensions (HVX), and so on. Many smartphones to- results should be reproducible outside the submitting day are Arm based, but the CPU cores generally implement organization. a heterogeneous “Big.Little” architecture [4]. Some SoCs even have big-CPU clusters where some CPUs clock faster MLPerf’s approach to addressing the mobile-AI bench- than others. Also, devices fall into different tiers with dif- mark needs of smartphones is to build an Android app ferent hardware capabilities at different prices, varying in that all tests must use. As of the initial v0.7 release of their memory capacity and storage features. MLPerf Mobile, the app employs a standard set of four Any processing engine can run ML workloads, but neural-network models for three vision tasks and one NLP this flexibility also
Recommended publications
  • FIT to WORK: IMPROVING the SECURITY of MONITORED EMPLOYEES' HEALTH DATA Elizabeth A. Brown INTRODUCTION Imagine Coming to Work
    FIT TO WORK: IMPROVING THE SECURITY OF MONITORED EMPLOYEES' HEALTH DATA Elizabeth A. Brown1 INTRODUCTION Imagine coming to work one day and finding that your employer has given everyone in the company a wearable FitBit health monitor, free of charge. You pop the FitBit on, grateful for another bit of help in managing the health concerns that nag at you persistently but which never quite rise to the top of your priority list. At your next performance review, your supervisor expresses concern about your anxiety levels. Although your work output is slightly off, she notes, there has been a correlation in your lack of sleep and exercise, and she suspects you are depressed. You wonder how your employer might know these things, whether or not they are true, and then you remember the FitBit. Your supervisor then tells you that the promotion you had wanted is going to a colleague who is “better equipped to handle the demands of the job.” You interview for another job, and are asked to provide the password to the HealthDrive account that centralizes the fitness data all the apps on your iPhone collect about you during the day. Similar scenarios are playing out now in workplaces across the country, and will do so more frequently as the personal health sensor market and employee monitoring trends continue to grow. Employers are making key decisions based on employees’ biometric data, collected from specialized devices like a FitBit or the health-related apps installed on mobile phones. BP, for example, adjusts its employees’ health care premiums depending on how much physical activity their wearable FitBit devices monitor – devices that BP provides to thousands of employees, their spouses, and retirees for free.
    [Show full text]
  • Your Voice Assistant Is Mine: How to Abuse Speakers to Steal Information and Control Your Phone ∗ †
    Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone ∗ y Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang Department of Information Engineering The Chinese University of Hong Kong {dw013, lx012, zz113, khzhang}@ie.cuhk.edu.hk ABSTRACT General Terms Previous research about sensor based attacks on Android platform Security focused mainly on accessing or controlling over sensitive compo- nents, such as camera, microphone and GPS. These approaches Keywords obtain data from sensors directly and need corresponding sensor invoking permissions. Android Security; Speaker; Voice Assistant; Permission Bypass- This paper presents a novel approach (GVS-Attack) to launch ing; Zero Permission Attack permission bypassing attacks from a zero-permission Android application (VoicEmployer) through the phone speaker. The idea of 1. INTRODUCTION GVS-Attack is to utilize an Android system built-in voice assistant In recent years, smartphones are becoming more and more popu- module – Google Voice Search. With Android Intent mechanism, lar, among which Android OS pushed past 80% market share [32]. VoicEmployer can bring Google Voice Search to foreground, and One attraction of smartphones is that users can install applications then plays prepared audio files (like “call number 1234 5678”) in (apps for short) as their wishes conveniently. But this convenience the background. Google Voice Search can recognize this voice also brings serious problems of malicious application, which have command and perform corresponding operations. With ingenious been noticed by both academic and industry fields. According to design, our GVS-Attack can forge SMS/Email, access privacy Kaspersky’s annual security report [34], Android platform attracted information, transmit sensitive data and achieve remote control a whopping 98.05% of known malware in 2013.
    [Show full text]
  • Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
    Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems Nan Zhang∗, Xianghang Mi∗, Xuan Fengy∗, XiaoFeng Wang∗, Yuan Tianz and Feng Qian∗ ∗Indiana University, Bloomington Email: fnz3, xmi, xw7, [email protected] yBeijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China Email: [email protected] zUniversity of Virginia Email: [email protected] Abstract—Virtual personal assistants (VPA) (e.g., Amazon skills by Amazon and actions by Google1) to offer further Alexa and Google Assistant) today mostly rely on the voice helps to the end users, for example, order food, manage bank channel to communicate with their users, which however is accounts and text friends. In the past year, these ecosystems known to be vulnerable, lacking proper authentication (from the user to the VPA). A new authentication challenge, from the VPA are expanding at a breathtaking pace: Amazon claims that service to the user, has emerged with the rapid growth of the VPA already 25,000 skills have been uploaded to its skill market to ecosystem, which allows a third party to publish a function (called support its VPA (including the Alexa service running through skill) for the service and therefore can be exploited to spread Amazon Echo) [1] and Google also has more than one thousand malicious skills to a large audience during their interactions actions available on its market for its Google Home system with smart speakers like Amazon Echo and Google Home. In this paper, we report a study that concludes such remote, large- (powered by Google Assistant).
    [Show full text]
  • CMSC 411: Computer Architecture
    CMSC 411: Computer Architecture Spring 2019 Jason Tang "1 About Your Friendly Instructor • Jason Tang (just call me Jason!)! • UMBC adjunct faculty member since 2012! • Taught CMSC 104, 202, 421, and 411! • Work full-time at a nearby mega-corporation as a software engineer "2 Contact Information • Email me at [email protected]! • O$ce in ITE 201C! • Tuesday / Thursday, 7:00 pm - 8:00 pm, right after class! • Teaching Assistant:! • TBA! • "3 Am I in the Right Class? • Prerequisites are:! • CMSC 313, or! • CMPE 212 + CMPE 310! • Must be able to read hexadecimal notation! • Should already by familiar with C/C++ and some assembly code! • This does not mean Java, Python, or other scripting language "4 Required Programming Knowledge • Know how (or research on Stack Overflow) to do these things:! • Read the very fantastic man pages! • Call a function and pass values in and out! • Di%erence between an in parameter, out parameter, and in/out parameter! • Know what a C++ reference technically is! • Understand basic boolean logic "5 Topics Covered • Instruction Sets! • Performance Measurements! • Machine Arithmetic! • Processor Design! • Memory Systems! • I/O Design! • Computer Buses "6 Course Information • http://www.csee.umbc.edu/~jtang/cs411.s19! • Grades will be posted on Blackboard! • Discussion forums are also on Blackboard! • All assignments submitted via submit system at linux.gl.umbc.edu! • Ensure you have a way to transfer files between your development machine and UMBC server (scp, PuTTy, Cyberduck, or equivalent)! • Using the clipboard to
    [Show full text]
  • Remote Connect 2016
    The Convenience of Remote Connect 2016 TOYOTA APP SMARTWATCH GOOGLE AMAZON Remote Connect As a Companion of the Smartphone ASSISTANT ALEXA Toyota Action Toyota Skill Toyota offers an incredible array of convenience and connectivity features. These features now includeGoogle Assistant and Amazon Alexa3 capability – as well as smartwatch integration – for 2018 and later models equipped with Remote Connect². KEY FOB WITH REMOTE FUNCTIONALITY Vehicles equipped with Remote Connect² have key fob13 compatibility for Remote Start1. Connected Services registration will be required to use the complete suite of Remote Connect services, which include Smartphone, Smartwatch, and smart home devices. Audio Plus vehicle key fob functionality is available for up to 3 years. Beyond 3 years requires a subscription. Applicable for select Model Year 2018 through 2020 Remote Connect capable vehicles. Select Model Year 2020 Remote Connect capable vehicles will have functionality for up to 10 years. Premium Audio vehicle key fob functionality is available for up to 10 years. Beyond 10 years requires a subscription. Applicable for select Model Year 2018 through 2020 Remote Connect capable vehicles. Using the key fob to remote start my Toyota: 1. Press the LOCK button on the remote. 2. Press the LOCK button a second time within 1 second. 3. Press the LOCK button again, this time holding it for 3 seconds. The engine will start. Note: Key Fob Remote Start will not function if Connected Services are waived. REMOTE CONNECT EQUIPPED VEHICLES BUILT BEFORE 11/12/18 Remote Connect equipped vehicles built before 11/12/18 were required to have an active Remote Connect trial or paid subscription for the key fob to perform remote start functionality.
    [Show full text]
  • Digital Forensic Analysis of Smart Watches
    TALLINN UNIVERSITY OF TECHNOLOGY School of Information Technologies Kehinde Omotola Adebayo (174449IVSB) DIGITAL FORENSIC ANALYSIS OF SMART WATCHES Bachelor’s Thesis Supervisor: Hayretdin Bahsi Research Professor Tallinn 2020 TALLINNA TEHNIKAÜLIKOOL Infotehnoloogia teaduskond Kehinde Omotola Adebayo (174449IVSB) NUTIKELLADE DIGITAALKRIMINALISTIKA Bachelor’s Thesis Juhendaja: Hayretdin Bahsi Research Professor Tallinn 2020 Author’s declaration of originality I hereby certify that I am the sole author of this thesis. All the used materials, references to the literature and the work of others have been referred to. This thesis has not been presented for examination anywhere else. Author: Kehinde Omotola Adebayo 30.04.2020 3 Abstract As wearable technology is becoming increasingly popular amongst consumers and projected to continue to increase in popularity they become probable significant source of digital evidence. One category of wearable technology is smart watches and they provide capabilities to receive instant messaging, SMS, email notifications, answering of calls, internet browsing, fitness tracking etc. which can be a great source of digital artefacts. The aim of this thesis is to analyze Samsung Gear S3 Frontier and Fitbit Versa Smartwatches, after which we present findings alongside the limitations encountered. Our result shows that we can recover significant artefacts from the Samsung Gear S3 Frontier, also more data can be recovered from Samsung Gear S3 Frontier than the accompanying mobile phone. We recovered significant data that can serve as digital evidence, we also provided a mapping that would enable investigators and forensic examiners work faster as they are shown where to look for information in the course of an investigation. We also presented the result of investigating Fitbit Versa significant artefacts like Heart rate, sleep, exercise and personal data like age, weight and height of the user of the device, this shows this device contains artefacts that might prove useful for forensic investigators and examiners.
    [Show full text]
  • Adattester: Secure Online Mobile Advertisement Attestation Using Trustzone
    AdAttester: Secure Online Mobile Advertisement Attestation Using TrustZone Wenhao Li, Haibo Li, Haibo Chen, Yubin Xia Institute of Parallel and Distributed Systems Shanghai Jiao Tong University ABSTRACT 1billiondollarsin2013duetothesefraudsandaroundonethird Mobile advertisement (ad for short) is a major financial pillar for of mobile ad clicks may constitute click-spam [18]. The most re- developers to provide free mobile apps. However, it is frequently cent research study [33] shows that, one of the largest click fraud thwarted by ad fraud, where rogue code tricks ad providers by forg- botnets, called ZeroAccess, induces advertising losses on the or- ing ad display or user clicks, or both. With the mobile ad market der of $100,000 per day. Ad frauds can typically be characterized growing drastically (e.g., from $8.76 billion in 2012 to $17.96 bil- into two types [26]: (1) Bot-driven frauds employ bot networks to lion in 2013), it is vitally important to provide a verifiable mobile initiate forged ad impressions and clicks; (2) Interaction frauds ma- ad framework to detect and prevent ad frauds. Unfortunately,this nipulate visual layouts of ads to trigger ad impressions and unaware is notoriously hard as mobile ads usually run in an execution envi- clicks from the end users. ronment with a huge TCB. Because of the urgent need to detecting mobile ad frauds, prior This paper proposes a verifiable mobile ad framework called approaches have made important first steps by using an offline- AdAttester, based on ARM’s TrustZone technology. AdAttester based approach [16, 26]. Specifically, they trigger the execution provides two novel security primitives, namely unforgeable clicks of mobile apps in a controlled environment to observe deviated and verifiable display.Thetwoprimitivesattestthatad-relatedop- behavior to detect ad frauds.
    [Show full text]
  • Geekbench 3 License Keygen 26
    1 / 5 Geekbench 3 License Keygen 26 Geekbench 3 License Keygen 26 > http://fancli.com/19xvdd 1a8c34a149 Geekbench 3 is Primate Labs' cross-platform processor benchmark, .... Call of duty 4 Serial key Included For Pc Only free · [P3D] - Beech B200 ... full hd Don 2 movies free download 720p torrent ... geekbench 3 license keygen 26. 5960x cpu cache voltage, Intel Core i7-5960X - Benchmark, Geekbench 5, Cinebench R20, ... The Intel XScale processor supports a range of frequencies and voltages in order to allow the user to save power [3]. Instead ... Serial number to imei converter free ... Vcenter 7 keygen ... Jobsmart 26 gallon air compressor specs.. Geekbench 3 License Keygen 26 DOWNLOAD: http://cinurl.com/1ff2qd geekbench keygen, geekbench 4 keygen, geekbench 3 keygen 608fcfdb5b 3 Crack 61 .... ... work with our system. 3. Ready for kiosk ... II gaming platform. Novomatic(Gaminator) offline casino system ... geekbench 3 license keygen 26. Coverage setting aviation 4 audio hijack pro keygen. ... Download Crack Archicad 19 4006 Ita: Audio hijack pro 2.10.5 keygen ... Geekbench 3.. I told them that I wasn't expecting that and have adobe cs5 keygen mac 2020 reason to do so given that CS3 is serving me. ... To or adobe mindjet 26 adobe. ... These Geekbench 3 benchmarks are in bit mode and are for a single processor .... Crack Data Glitch 2 0 1. 3 Juin 2020 0. data glitch, data ... Rowbyte Data Glitch 2.0; Data Glitch 2 Serial Serial Numbers. Con . ... geekbench 3 license keygen 26 Increase benchmark scores (Antutu, Geekbench, Quadrant) Use App ... PlayerPro Music Player v4.2 APK Is Here [LATEST] Driver Magician 5.0 Keygen Is Here! ..
    [Show full text]
  • Geekbench 5 Compute Workloads
    Geekbench 5 Compute Workloads Introduction 3 Platform Support 4 API Support 4 Runtime 5 Scores 6 Comparing Scores 6 Compute Workloads 7 Sobel 7 Canny 7 Stereo Matching 7 Histogram Equalization 7 Gaussian Blur 8 Depth of Field 8 Face Detection 8 Horizon Detection 8 Feature Matching 9 Particle Physics 9 SFFT 9 September 2019 "2 Introduction This document outlines the workloads included in the Geekbench 5 Compute Benchmark suite. Compute Benchmark scores are used to evaluate and optimize GPU Compute performance using workloads that include image processing, computational photography, computer vision, and machine learning. Performance in these workloads is important for a wide variety of applications including cameras, image editors, and real-time renderers. September 2019 "3 Platform Support Platform Minimum Version Comment Android Android 7 “Nougat” iOS iOS 12 Linux Ubuntu 16.04 LTS macOS macOS 10.13 Windows Windows 10 API Support Geekbench 5 supports the following GPU Compute APIs: API Version Comment CUDA CUDA 9.0 Compute Capability 3.0 or later. Metal Metal 2.0 Metal 2.1 if available. OpenCL OpenCL 1.1 Vulkan Vulkan 1.0 September 2019 "4 Runtime Geekbench 5 runs Compute workloads in the order listed here as the Compute Benchmark. Each workload is run for 20 iterations by default. September 2019 "5 Scores Geekbench 5 provides one overall score for the Compute Benchmark. The overall score is the geometric mean of the scores of the individual Compute workloads. Comparing Scores Each Compute workload has an implementation for each supported Compute API. While it is possible to compare scores across APIs (e.g., a OpenCL score with a Metal score) it is important to keep in mind that due to the nature of Compute APIs, the performance difference can be due to more than differences in the underlying hardware (e.g., the GPU driver can have a huge impact on performance).! September 2019 "6 Compute Workloads Sobel The Sobel operator is used in image processing and computer vision for finding edges in images.
    [Show full text]
  • AT&T Samsung Galaxy S II
    Review: AT&T Samsung Galaxy S II 27 October 2011, By Matthew Fortner This also makes it pleasantly light. Despite having a larger screen and larger dimensions than my iPhone 4S, the Galaxy S II is lighter. Smartphone ergonomics can be subjective, but I felt more confident handling the Samsung. This surprised me since I thought the iPhone's smaller size would give it a handling edge. Users among those who actually make calls will appreciate the good and distortion-free call quality. Those moving from 3G will notice data transfer speeds over AT&T's HSPA+ network to be consistently faster, but not as fast as LTE. There has been a lot of talk about smartphone cameras lately. This new Galaxy S has an 8-megapixel back- illuminated sensor camera aided by a single-LED flash. It can record 1080p video at 30 frames per second. There is also a fixed focus front-facing Android is on fire, and Samsung is stoking the 2-megapixel camera that can also record VGA flames with the Galaxy S II. It's the fastest selling video at 640x480. Android device with 10 million units sold worldwide. Is the Galaxy S II the best current Android phone? There a have been a number of image Maybe. AT&T Wireless sent us theirs to try out. comparisons online. Some give the edge to Samsung, and some to Apple. I found both to be Android fans may have the forthcoming Motorola capable with distinctly different characteristics that Droid RAZR and Samsung Galaxy Nexus in their will appeal to different users.
    [Show full text]
  • Geekbench Browser
    MAcPro7,1 - Geekbench Browser https://browser.geekbench.com/v4/cpu/15449062 Geekbench Browser Geekbench 5 Top Single-Core Results Top Multi-Core Results Recent Results Search Results Recent Compute Results Search Compute Results Geekbench 4 Top Single-Core Results Top Multi-Core Results Recent Results Search Results Recent Compute Results Search Compute Results Benchmark Charts Android Benchmark Chart iOS Benchmark Chart Mac Benchmark Chart Processor Benchmark Chart CUDA Benchmark Chart Metal Benchmark Chart OpenCL Benchmark Chart Vulkan Benchmark Chart Search Account Profile Settings Log Out This result has been added to your account. MAcPro7,1 Single-Core Score Multi-Core Score 6567 38907 Geekbench 4.4.2 Tryout for Mac OS X x86 (64-bit) Result Information User foster2005 Upload Date May 01 2020 07:27 AM Views 1 System Information System Information Operating System macOS 10.15.5 (Build 19F72f) Model MAcPro7,1 Motherboard Acidanthera Mac-EE2EBD4B90B839A8 MacBook10,1 Memory 32.00 GB 3200 MHz DDR4 Northbridge 1 of 6 5/1/20, 1:33 AM MAcPro7,1 - Geekbench Browser https://browser.geekbench.com/v4/cpu/15449062 System Information Southbridge BIOS Acidanthera 185.0.0.0.0 Processor Information Name Intel Core i9-9900K Topology 1 Processor, 8 Cores, 16 Threads Identifier GenuineIntel Family 6 Model 158 Stepping 12 Base Frequency 3.60 GHz Package Codename L1 Instruction Cache 32.0 KB x 8 L1 Data Cache 32.0 KB x 8 L2 Cache 256 KB x 8 L3 Cache 16.0 MB x 1 Single-Core Performance Single-Core Score 6567 Crypto Score 4285 Integer Score 6545 Floating Point
    [Show full text]
  • How to Design a Baseband Debugger
    How to design a baseband debugger David Berard and Vincent Fargues [email protected] [email protected] Synacktiv Abstract. Modern basebands are an interesting topic for reverse engi- neers. However, the lack of debugger for these components makes this work harder. This article presents how a 1-day vulnerability in Samsung Trustzone can be used to rewrite the Shannon baseband memory and install a debugger on a Galaxy S7 phone. The details of the debugger development are explained and a demonstration will be done by using specific breakpoints to extract interesting informations. 1 Introduction In 2020, smartphones are used by everyone and have become ones of the most targeted devices. However, phone manufacturers put a lot of effort into securing them by hardening kernel, browsers, and every binary running on the application processor. As a consequence, researchers began looking for vulnerabilities in other components such as Wi-Fi firmware, Bluetooth firmware, or basebands [2, 4,5] which became easier targets. This presentation focuses on the baseband component which is used by a modern phone to connect to cellular networks (2G, 3G, 4G and even 5G). Another motivation for a researcher may have been the fact that several smartphone’s basebands are a target for the mobile pwn2own 1 competition. During the last 3 years, the team Fluoroacetate has been able to exploit a vulnerability in the Samsung baseband called Shannon. The Shannon’s real-time operating system is relatively big, and many tasks are involved to provide a connection to the cellular network. The functioning is quite complex to understand, and no debugger is available to do dynamic analysis of the OS/Tasks.
    [Show full text]