Por favor, use este identificador para citar o enlazar este ítem: https://doi.org/10.1109/SEED61283.2024.00017

Registro completo de metadatos
Campo DCValorLengua/Idioma
dc.contributor.authorEkemark, Per-
dc.contributor.authorRos Bardisa, Alberto-
dc.contributor.authorSagonas, Konstantinos-
dc.contributor.authorKaxiras, Stefanos-
dc.date.accessioned2024-12-18T07:47:10Z-
dc.date.available2024-12-18T07:47:10Z-
dc.date.issued2024-11-05-
dc.identifier.isbn979-8-3315-0565-3-
dc.identifier.urihttp://hdl.handle.net/10201/147579-
dc.description© 2024 IEEE. This document is the Submitted version of a Published Work that appeared in final form in International Symposium on Secure and Private Execution Environment Design (SEED). To access the final edited and published work see https://doi.org/10.1109/SEED61283.2024.00017es
dc.description.abstractMemory integrity protection is intended for secure execution, and it is typically associated with programs running on a single core. However, with the emergence of multi-processor systems-on-chip and chiplets, extending memory integrity protection to cache-coherent multiprocessors becomes essential. In this work, we explore for the first time the design space for maintaining coherence in fine-grain integrity metadata at the block level. We discuss various policies for updating the integrity tree using the underlying coherence protocol, and examine how these policies affect coherence traffic. We introduce the concepts of proactive and reactive update initiation, and discuss their implications for data and integrity-tree blocks. We also investigate the trade-offs between eager and lazy update propagation policies, focusing on coherence transactions such as invalidations and downgrades to analyse the pros and cons of different approaches. What we observe is that for some benchmarks the choice between the eager and the lazy update initiation policy does not make much difference, while for many other benchmarks one policy is better over the other, depending on how the benchmark shares its data.es
dc.formatapplication/pdfes
dc.format.extent11es
dc.languageenges
dc.publisherIEEE Computer Societyes
dc.relationSin financiación externa a la Universidades
dc.relation.ispartofInternational Symposium on Secure and Private Execution Environment Design (SEED), 2024, May 16-17, Orlando, pp. 62-72es
dc.rightsinfo:eu-repo/semantics/embargoedAccesses
dc.subjectMemoryes
dc.subjectIntegrityes
dc.subjectSecurityes
dc.subjectCoherencees
dc.titleA first exploration of fine-grain coherence for integrity metadataes
dc.typeinfo:eu-repo/semantics/articlees
dc.relation.publisherversionhttps://ieeexplore.ieee.org/document/10738370es
dc.embargo.termsSI-
dc.identifier.doihttps://doi.org/10.1109/SEED61283.2024.00017-
dc.contributor.departmentIngeniería y Tecnología de Computadores-
Aparece en las colecciones:Artículos

Ficheros en este ítem:
Fichero Descripción TamañoFormato 
pekemark-seed24.pdf469,57 kBAdobe PDFVista previa
Visualizar/Abrir    Solicitar una copia


Los ítems de Digitum están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.