uu.seUppsala University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Efficient invisible speculative execution through selective delay and value prediction
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Architecture and Computer Communication.ORCID iD: 0000-0003-4172-8607
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Architecture and Computer Communication.
University of Murcia, Murcia, Spain.ORCID iD: 0000-0001-5757-1064
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Architecture and Computer Communication.
Show others and affiliations
2019 (English)In: Proc. 46th International Symposium on Computer Architecture, New York: ACM Press, 2019, p. 723-735Conference paper, Published paper (Refereed)
Abstract [en]

Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, has recently been shown to enable a slew of security attacks.  All these attacks are centered around a common set of behaviors: During speculative execution, the architectural state of the system is kept unmodified, until the speculation can be verified.  In the event that a misspeculation occurs, then anything that can affect the architectural state is reverted (squashed) and re-executed correctly.  However, the same is not true for the microarchitectural state.  Normally invisible to the user, changes to the microarchitectural state can be observed through various side-channels, with timing differences caused by the memory hierarchy being one of the most common and easy to exploit.  The speculative side-channels can then be exploited to perform attacks that can bypass software and hardware checks in order to leak information.  These attacks, out of which the most infamous are perhaps Spectre and Meltdown, have led to a frantic search for solutions.In this work, we present our own solution for reducing the microarchitectural state-changes caused by speculative execution in the memory hierarchy.  It is based on the observation that if we only allow accesses that hit in the L1 data cache to proceed, then we can easily hide any microarchitectural changes until after the speculation has been verified.  At the same time, we propose to prevent stalls by value predicting the loads that miss in the L1.  Value prediction, though speculative, constitutes an invisible form of speculation, not seen outside the core.  We evaluate our solution and show that we can prevent observable microarchitectural changes in the memory hierarchy while keeping the performance and energy costs at 11% and 7%, respectively.  In comparison, the current state of the art solution, InvisiSpec, incurs a 46% performance loss and a 51% energy increase.

Place, publisher, year, edition, pages
New York: ACM Press, 2019. p. 723-735
Keywords [en]
caches, side-channel attacks, speculative execution
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:uu:diva-387329DOI: 10.1145/3307650.3322216ISBN: 978-1-4503-6669-4 (print)OAI: oai:DiVA.org:uu-387329DiVA, id: diva2:1328541
Conference
ISCA 2019, June 22–26, Phoenix, AZ, USA
Funder
Swedish Research Council, 2015-05159Swedish Foundation for Strategic Research , SM17-0064
Note

Available from: 2019-06-22 Created: 2019-06-21 Last updated: 2019-08-27Bibliographically approved

Open Access in DiVA

fulltext(1911 kB)61 downloads
File information
File name FULLTEXT01.pdfFile size 1911 kBChecksum SHA-512
ada0850085c0105499d1d9da085446679dd9e479041125b23c5633ddf5ddb04d48c5c1d8cda7527e2d500b6717e258b621a094fd9e9d186ea9f32bafde8973a1
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Authority records BETA

Sakalis, ChristosKaxiras, StefanosJimborean, Alexandra

Search in DiVA

By author/editor
Sakalis, ChristosKaxiras, StefanosRos, AlbertoJimborean, AlexandraSjälander, Magnus
By organisation
Computer Architecture and Computer Communication
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 61 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 105 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf