Cristin-resultat-ID: 1839080
Sist endret: 30. juni 2022, 13:31
NVI-rapporteringsår: 2020
Resultat
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
2020

Clearing the Shadows: Recovering Lost Performance for Invisible Speculative Execution through HW/SW Co-Design

Bidragsytere:
  • Kim-Anh Tran
  • Christos Sakalis
  • Magnus Själander
  • Alberto Ros
  • Stefanos Kaxiras og
  • Alexandra Jimborean

Bok

Om resultatet

Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
Publiseringsår: 2020
Sider: 241 - 254
ISBN:
  • 978-1-4503-8075-1
Open Access

Importkilder

Scopus-ID: 2-s2.0-85094179995

Klassifisering

Fagfelt (NPI)

Fagfelt: IKT
- Fagområde: Realfag og teknologi

Beskrivelse Beskrivelse

Tittel

Clearing the Shadows: Recovering Lost Performance for Invisible Speculative Execution through HW/SW Co-Design

Sammendrag

Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructions to bypass other slower instructions in order to fully utilize the processor's resources. Speculatively executed instructions do not affect the correctness of the application, as they never change the architectural state, but they do affect the micro-architectural behavior of the system. Until recently, these changes were considered to be safe but with the discovery of new security attacks that misuse speculative execution to leak secrete information through observable micro-architectural changes (so called side-channels), this is no longer the case. To solve this issue, a wave of software and hardware mitigations have been proposed, the majority of which delay and/or hide speculative execution until it is deemed to be safe, trading performance for security. These newly enforced restrictions change how speculation is applied and where the performance bottlenecks appear, forcing us to rethink how we design and optimize both the hardware and the software. We observe that many of the state-of-the-art hardware solutions targeting memory systems operate on a common scheme: the visible execution of loads or their dependents is blocked until they become safe to execute. In this work we propose a generally applicable hardware-software extension that focuses on removing the causes of loads' unsafety, generally caused by control and memory dependence speculation. As a result, we manage to make more loads safe to execute at an early stage, which enables us to schedule more loads at a time to overlap their delays and improve performance. We apply our techniques on the state-of-the-art Delay-on-Miss hardware defense and show that we reduce the performance gap to the unsafe baseline by 53% (on average).

Bidragsytere

Kim-anh Tran

Bidragsyterens navn vises på dette resultatet som Kim-Anh Tran
  • Tilknyttet:
    Forfatter
    ved Uppsala universitet

Christos Sakalis

  • Tilknyttet:
    Forfatter
    ved Uppsala universitet
Aktiv cristin-person

Hans Magnus Själander

Bidragsyterens navn vises på dette resultatet som Magnus Själander
  • Tilknyttet:
    Forfatter
    ved Institutt for datateknologi og informatikk ved Norges teknisk-naturvitenskapelige universitet

Alberto Ros

  • Tilknyttet:
    Forfatter
    ved Universidad de Murcia

Stefanos Kaxiras

  • Tilknyttet:
    Forfatter
    ved Uppsala universitet
1 - 5 av 6 | Neste | Siste »

Resultatet er en del av Resultatet er en del av

PACT '20: Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques.

N/A, N/A. 2020, Association for Computing Machinery (ACM). Vitenskapelig antologi/Konferanseserie
1 - 1 av 1