Por favor, use este identificador para citar o enlazar este ítem:
https://doi.org/10.1109/SEED61283.2024.00017


Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Ekemark, Per | - |
dc.contributor.author | Ros Bardisa, Alberto | - |
dc.contributor.author | Sagonas, Konstantinos | - |
dc.contributor.author | Kaxiras, Stefanos | - |
dc.date.accessioned | 2024-12-18T07:47:10Z | - |
dc.date.available | 2024-12-18T07:47:10Z | - |
dc.date.issued | 2024-11-05 | - |
dc.identifier.isbn | 979-8-3315-0565-3 | - |
dc.identifier.uri | http://hdl.handle.net/10201/147579 | - |
dc.description | © 2024 IEEE. This document is the Submitted version of a Published Work that appeared in final form in International Symposium on Secure and Private Execution Environment Design (SEED). To access the final edited and published work see https://doi.org/10.1109/SEED61283.2024.00017 | es |
dc.description.abstract | Memory integrity protection is intended for secure execution, and it is typically associated with programs running on a single core. However, with the emergence of multi-processor systems-on-chip and chiplets, extending memory integrity protection to cache-coherent multiprocessors becomes essential. In this work, we explore for the first time the design space for maintaining coherence in fine-grain integrity metadata at the block level. We discuss various policies for updating the integrity tree using the underlying coherence protocol, and examine how these policies affect coherence traffic. We introduce the concepts of proactive and reactive update initiation, and discuss their implications for data and integrity-tree blocks. We also investigate the trade-offs between eager and lazy update propagation policies, focusing on coherence transactions such as invalidations and downgrades to analyse the pros and cons of different approaches. What we observe is that for some benchmarks the choice between the eager and the lazy update initiation policy does not make much difference, while for many other benchmarks one policy is better over the other, depending on how the benchmark shares its data. | es |
dc.format | application/pdf | es |
dc.format.extent | 11 | es |
dc.language | eng | es |
dc.publisher | IEEE Computer Society | es |
dc.relation | Sin financiación externa a la Universidad | es |
dc.relation.ispartof | International Symposium on Secure and Private Execution Environment Design (SEED), 2024, May 16-17, Orlando, pp. 62-72 | es |
dc.rights | info:eu-repo/semantics/embargoedAccess | es |
dc.subject | Memory | es |
dc.subject | Integrity | es |
dc.subject | Security | es |
dc.subject | Coherence | es |
dc.title | A first exploration of fine-grain coherence for integrity metadata | es |
dc.type | info:eu-repo/semantics/article | es |
dc.relation.publisherversion | https://ieeexplore.ieee.org/document/10738370 | es |
dc.embargo.terms | SI | - |
dc.identifier.doi | https://doi.org/10.1109/SEED61283.2024.00017 | - |
dc.contributor.department | Ingeniería y Tecnología de Computadores | - |
Aparece en las colecciones: | Artículos |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
pekemark-seed24.pdf | 469,57 kB | Adobe PDF | ![]() Visualizar/Abrir Solicitar una copia |
Los ítems de Digitum están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.