Por favor, use este identificador para citar o enlazar este ítem: 10.1145/3410463.3414640

Título: Clearing the Shadows: Recovering Lost Performance for Invisible Speculative Execution through HW/SW Co-Design
Fecha de publicación: oct-2020
ISBN: 978-1-4503-8075-1
Resumen: Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructions to bypass other slower instructions in order to fully utilize the processor’s resources. Speculatively executed instructions do not affect the correctness of the application, as they never change the architectural state, but they do affect the micro-architectural behavior of the system. Until recently, these changes were considered to be safe but with the discovery of new security attacks that misuse speculative execution to leak secrete information through observable micro-architectural changes (so called side-channels), this is no longer the case. To solve this issue, a wave of software and hardware mitigations have been proposed, the majority of which delay and/or hide speculative execution until it is deemed to be safe, trading performance for security. These newly enforced restrictions change how speculation is applied and where the performance bottlenecks appear, forcing us to rethink how we design and optimize both the hardware and the software.We observe that many of the state-of-the-art hardware solutions targeting memory systems operate on a common scheme: the visible execution of loads or their dependents is blocked until they become safe to execute. In this work we propose a generally applicable hardware-software extension that focuses on removing the causes of loads’ unsafety, generally caused by control and memory dependence speculation. As a result, we manage to make more loads safe to execute at an early stage, which enables us to schedule more loads at a time to overlap their delays and improve performance. We apply our techniques on the state-of-the-art Delay-on-Miss hardware defense and show that we reduce the performance gap to the unsafe baseline by 53% (on average).
Autor/es principal/es: Tran, Kim-Anh
Sakalis, Christos
Själander, Magnus
Ros, Alberto
Kaxiras, Stefanos
Jimborean, Alexandra
Facultad/Departamentos/Servicios: Facultades, Departamentos, Servicios y Escuelas::Facultades de la UMU::Facultad de Informática
Forma parte de: 29th International Conference on Parallel Architectures and Compilation Techniques (PACT)
URI: http://hdl.handle.net/10201/106143
DOI: 10.1145/3410463.3414640
Tipo de documento: info:eu-repo/semantics/article
info:eu-repo/semantics/lecture
Derechos: info:eu-repo/semantics/openAccess
Atribución 4.0 Internacional
Aparece en las colecciones:Artículos: Ingeniería y Tecnología de Computadores

Ficheros en este ítem:
Fichero Descripción TamañoFormato 
ktran-pact20.pdf1,01 MBAdobe PDFVista previa
Visualizar/Abrir


Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons Creative Commons