SPX64
- 30 December 2020
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Architecture and Code Optimization
- Vol. 18 (1), 1-26
- https://doi.org/10.1145/3436730
Abstract
General-purpose computing systems employ memory hierarchies to provide the appearance of a single large, fast, coherent memory. In special-purpose CPUs, programmers manually manage distinct, non-coherent scratchpad memories. In this article, we combine these mechanisms by adding a virtually addressed, set-associative scratchpad to a general purpose CPU. Our scratchpad exists alongside a traditional cache and is able to avoid many of the programming challenges associated with traditional scratchpads without sacrificing generality (e.g., virtualization). Furthermore, our design delivers increased security and improves performance, especially for workloads with high locality or that interact with nonvolatile memory.Keywords
Funding Information
- NSF (CCF-1723624, CCF-1750826,CCF-1723476,CNS-1525855,CCF-1723571)
This publication has 26 references indexed in Scilit:
- StashPublished by Association for Computing Machinery (ACM) ,2015
- Last-Level Cache Side-Channel Attacks are PracticalPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AESPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- AtlasACM SIGPLAN Notices, 2014
- Cross-VM side channels and their use to extract private keysPublished by Association for Computing Machinery (ACM) ,2012
- The gem5 simulatorACM SIGARCH Computer Architecture News, 2011
- A Semi-automatic Scratchpad Memory Management Framework for CMPLecture Notes in Computer Science, 2011
- The Cell Broadband Engine: Exploiting Multiple Levels of Parallelism in a Chip MultiprocessorInternational Journal of Parallel Programming, 2007
- Cache-Collision Timing Attacks Against AESLecture Notes in Computer Science, 2006
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996