Microarchitectural denial of service: Insuring microarchitectural fairness

被引:17
|
作者
Grunwald, D [1 ]
Ghiasi, S [1 ]
机构
[1] Univ Colorado, Dept Comp Sci, Boulder, CO 80309 USA
关键词
D O I
10.1109/MICRO.2002.1176268
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Simultaneous multithreading seeks to improve the aggregate computation bandwidth of a processor core by sharing resources such as functional units, caches, TLB and so on. To date, most research investigating the scheduling of these shared resources has focused on enhancing computational bandwidth. In this paper we examine scheduling fairness. First, we show that a thread running on an implementation of a SMT processor can suffer from "denial of service" by a malicious thread, slowing down the original thread by a factor of 10-20. Using performance counter hardware, we show that the slowdown occurs because of deliberate misuse of shared resources and design decisions that are necessary for high speed implementation. We then propose and evaluate a number of mechanisms to counter such malicious behavior: some affect the core scheduling algorithm and others simply attempt to identify activity that would affect threads sharing the same processor core. We find that harmful activity based mechanisms outperform core scheduling mechanisms. In addition, we show that they can be designed so that they can differentiate between malicious attacks and legitimate activities that may also make use of the same harmful activities.
引用
收藏
页码:409 / 418
页数:10
相关论文
共 50 条
  • [1] Automatic Microarchitectural Pipelining
    Galceran-Oms, Marc
    Cortadella, Jordi
    Bufistov, Dmitry
    Kishinevsky, Mike
    2010 DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2010), 2010, : 961 - 964
  • [2] Microarchitectural exploration with liberty
    Vachharajani, M
    Vachharajani, N
    Penry, DA
    Blome, JA
    August, DI
    35TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO-35), PROCEEDINGS, 2002, : 271 - 282
  • [3] A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service
    Semal, Benjamin
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    Kalbantner, Jan
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 360 - 377
  • [4] An ontology for microarchitectural design knowledge
    Garzás, J
    Piattini, M
    IEEE SOFTWARE, 2005, 22 (02) : 28 - +
  • [5] Microarchitectural dl/dt control
    Grochowski, E
    Ayers, D
    Tiwari, V
    IEEE DESIGN & TEST OF COMPUTERS, 2003, 20 (03): : 40 - 47
  • [6] Microarchitectural changes in the aging skeleton
    Gabet Y.
    Bab I.
    Current Osteoporosis Reports, 2011, 9 (4) : 177 - 183
  • [7] Microarchitectural Characterization on a Mobile Workload
    Lee, Woohyong
    Lee, Jiyoung
    Park, Bo Kyung
    Kim, R. Young Chul
    APPLIED SCIENCES-BASEL, 2021, 11 (03): : 1 - 13
  • [8] Rapid Prototyping for Microarchitectural Attacks
    Easdon, Catherine
    Schwarz, Michael
    Schwarzl, Martin
    Gruss, Daniel
    Proceedings of the 31st USENIX Security Symposium, Security 2022, 2022, : 3861 - 3877
  • [9] Measuring the impact of microarchitectural ideas
    Bose, P
    IEEE MICRO, 2006, 26 (01) : 5 - 6
  • [10] Rapid Prototyping for Microarchitectural Attacks
    Easdon, Catherine
    Schwarz, Michael
    Schwarzl, Martin
    Gruss, Daniel
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3861 - 3877