Show simple item record

dc.contributor.authorSakalis, C.
dc.contributor.authorChowdhury, Z.
dc.contributor.authorWadle, S.
dc.contributor.authorAktürk, İsmail
dc.contributor.authorRos, A.
dc.contributor.authorSjalander, M.
dc.contributor.authorKaxiras, S.
dc.contributor.authorKarpuzcu, U.
dc.date.accessioned2021-12-06T08:12:39Z
dc.date.available2021-12-06T08:12:39Z
dc.date.issued2021
dc.identifier.urihttp://hdl.handle.net/10679/7655
dc.identifier.urihttps://ieeexplore.ieee.org/document/9604354
dc.description.abstractRecent architectural approaches that address speculative side-channel attacks aim to prevent software from exposing the microarchitectural state changes of transient execution. The Delay-on-Miss technique is one such approach, which simply delays loads that miss in the L1 cache until they become non-speculative, resulting in no transient changes in the memory hierarchy. However, this costs performance, prompting the use of value prediction (VP) to regain some of the delay.However, the problem cannot be solved by simply introducing a new kind of speculation (value prediction). Value-predicted loads have to be validated, which cannot be commenced until the load becomes non-speculative. Thus, value-predicted loads occupy the same amount of precious core resources (e.g., reorder buffer entries) as Delay-on-Miss. The end result is that VP only yields marginal benefits over Delay-on-Miss.In this paper, our insight is that we can achieve the same goal as VP (increasing performance by providing the value of loads that miss) without incurring its negative side-effect (delaying the release of precious resources), if we can safely, non-speculatively, recompute a value in isolation (without being seen from the outside), so that we do not expose any information by transferring such a value via the memory hierarchy. Value Recomputation, which trades computation for data transfer was previously proposed in an entirely different context: to reduce energy-expensive data transfers in the memory hierarchy. In this paper, we demonstrate the potential of value recomputation in relation to the Delay-on-Miss approach of hiding speculation, discuss the trade-offs, and show that we can achieve the same level of security, reaching 93% of the unsecured baseline performance (5% higher than Delay-on-miss), and exceeding (by 3%) what even an oracular (100% accuracy and coverage) value predictor could do.en_US
dc.language.isoengen_US
dc.publisherIEEEen_US
dc.relation.ispartof2021 International Symposium on Secure and Private Execution Environment Design (SEED)en_US
dc.rightsrestrictedAccess
dc.titleDo not predict – Recompute! How value recomputation can truly boost the performance of invisible speculationen_US
dc.typeConference paperen_US
dc.publicationstatusPublisheden_US
dc.contributor.departmentÖzyeğin University
dc.contributor.authorID(ORCID 0000-0003-1970-2507 & YÖK ID 349836) Aktürk, İsmail
dc.contributor.ozuauthorAktürk, İsmail
dc.identifier.startpage89
dc.identifier.endpage100
dc.identifier.wosWOS:000799181700013
dc.identifier.doi10.1109/SEED51797.2021.00021
dc.subject.keywordsHardware securityen_US
dc.subject.keywordsSpeculation
dc.subject.keywordsRecomputation
dc.identifier.scopusSCOPUS:2-s2.0-85117451537
dc.contributor.authorMale1
dc.relation.publicationcategoryConference Paper - International - Institutional Academic Staff


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record


Share this page