Por favor, use este identificador para citar o enlazar este ítem:
10.1145/3410463.3414640
Twittear
Título: | Clearing the Shadows: Recovering Lost Performance for Invisible Speculative Execution through HW/SW Co-Design |
Fecha de publicación: | oct-2020 |
ISBN: | 978-1-4503-8075-1 |
Resumen: | Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructions to bypass other slower instructions in order to fully utilize the processor’s resources. Speculatively executed instructions do not affect the correctness of the application, as they never change the architectural state, but they do affect the micro-architectural behavior of the system. Until recently, these changes were considered to be safe but with the discovery of new security attacks that misuse speculative execution to leak secrete information through observable micro-architectural changes (so called side-channels), this is no longer the case. To solve this issue, a wave of software and hardware mitigations have been proposed, the majority of which delay and/or hide speculative execution until it is deemed to be safe, trading performance for security. These newly enforced restrictions change how speculation is applied and where the performance bottlenecks appear, forcing us to rethink how we design and optimize both the hardware and the software.We observe that many of the state-of-the-art hardware solutions targeting memory systems operate on a common scheme: the visible execution of loads or their dependents is blocked until they become safe to execute. In this work we propose a generally applicable hardware-software extension that focuses on removing the causes of loads’ unsafety, generally caused by control and memory dependence speculation. As a result, we manage to make more loads safe to execute at an early stage, which enables us to schedule more loads at a time to overlap their delays and improve performance. We apply our techniques on the state-of-the-art Delay-on-Miss hardware defense and show that we reduce the performance gap to the unsafe baseline by 53% (on average). |
Autor/es principal/es: | Tran, Kim-Anh Sakalis, Christos Själander, Magnus Ros, Alberto Kaxiras, Stefanos Jimborean, Alexandra |
Facultad/Departamentos/Servicios: | Facultades, Departamentos, Servicios y Escuelas::Facultades de la UMU::Facultad de Informática |
Forma parte de: | 29th International Conference on Parallel Architectures and Compilation Techniques (PACT) |
URI: | http://hdl.handle.net/10201/106143 |
DOI: | 10.1145/3410463.3414640 |
Tipo de documento: | info:eu-repo/semantics/article info:eu-repo/semantics/lecture |
Derechos: | info:eu-repo/semantics/openAccess Atribución 4.0 Internacional |
Aparece en las colecciones: | Artículos: Ingeniería y Tecnología de Computadores |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
ktran-pact20.pdf | 1,01 MB | Adobe PDF | Visualizar/Abrir |
Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons