Demystifying complex workload-DRAM interactions: An experimental study
It has become increasingly difficult to understand the complex interactions between modern
applications and main memory, composed of Dynamic Random Access Memory (DRAM) …
applications and main memory, composed of Dynamic Random Access Memory (DRAM) …
Chunked-cache: On-demand and scalable cache isolation for security architectures
G Dessouky, A Gruler, P Mahmoody… - arXiv preprint arXiv …, 2021 - arxiv.org
Shared cache resources in multi-core processors are vulnerable to cache side-channel
attacks. Recently proposed defenses have their own caveats: Randomization-based …
attacks. Recently proposed defenses have their own caveats: Randomization-based …
[PDF][PDF] Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags
Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in
C/C++ programs. Despite much research in the area, the performance overhead of (even …
C/C++ programs. Despite much research in the area, the performance overhead of (even …
Bcd deduplication: Effective memory compression using partial cache-line deduplication
In this paper, we identify new partial data redundancy among multiple cache lines that are
not exploited by traditional memory compression or memory deduplication. We propose …
not exploited by traditional memory compression or memory deduplication. We propose …
Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing Ready?
Many applications have been offloaded onto cloud environments to achieve higher agility,
access to more powerful computational resources, and obtain better infrastructure …
access to more powerful computational resources, and obtain better infrastructure …
A reusable characterization of the memory system behavior of spec2017 and spec2006
The SPEC CPU Benchmarks are used extensively for evaluating and comparing
improvements to computer systems. This ubiquity makes characterization critical for …
improvements to computer systems. This ubiquity makes characterization critical for …
RAMPART: RowHammer Mitigation and Repair for Server Memory Systems
SC Woo, W Elsasser, M Hamburg, E Linstadt… - Proceedings of the …, 2023 - dl.acm.org
RowHammer attacks are a growing security and reliability concern for DRAMs and computer
systems as they can induce many bit errors that overwhelm error detection and correction …
systems as they can induce many bit errors that overwhelm error detection and correction …
A Tight Holistic Memory Latency Bound Through Coordinated Management of Memory Resources
S Abdelhalim, D Germchi, M Hossam… - … Conference on Real …, 2023 - drops.dagstuhl.de
To facilitate the safe adoption of multi-core platforms in real-time systems, a plethora of
recent research efforts aim at bounding the delays induced by interference upon accessing …
recent research efforts aim at bounding the delays induced by interference upon accessing …
S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More
Attacks on heap memory are ever-increasing. Existing entropy-based secure memory
allocators can provide statistical defenses against various heap-based exploits, including …
allocators can provide statistical defenses against various heap-based exploits, including …
Microarchitectural exploration of STT-MRAM last-level cache parameters for energy-efficient devices
As the technology scaling advances, limitations of traditional memories in terms of density
and energy become more evident. Modern caches occupy a large part of a CPU physical …
and energy become more evident. Modern caches occupy a large part of a CPU physical …