TY - GEN
T1 - Disruptive prefetching
T2 - 8th ACM International Systems and Storage Conference, SYSTOR 2015
AU - Fuchs, Adi
AU - Lee, Ruby B.
N1 - Publisher Copyright:
© Copyright 2015 by the Association for Computing Machinery, Inc.
PY - 2015/5/26
Y1 - 2015/5/26
N2 - Caches are integral parts in modern computers; they leverage the memory access patterns of a program to mitigate the gap between the fast processors and slow memory components. Unfortunately, the behavior of caches can be exploited by attackers to infer the program's memory access patterns, by carrying out cache-based side-channel attacks, which can leak critical information. Secure caches that were proposed employ cache partitioning or randomized memory-to-cache mapping techniques to prevent these attacks. Such techniques may add to the complexity of cache designs. In this work, we suggest the use of specialized prefetching algorithms for the purpose of protecting from cachebased side-channel attacks. Our prefetchers can be combined with conventional set associative cache designs, are simple to employ, and require low incremental hardware overhead costs, if the base prefetching scheme is already employed. We integrated our prefetching policies with commonly used GHB and stride prefetching schemes, and compared their performance with the standard implementations of those schemes, on both conventional and secure cache designs. More specifically, our results show that the use of our secure prefetching policy delivers original prefetching performance when integrated with a stride prefetcher. Finally, we demonstrate how a disruptive prefetching scheme can protect the cache from an access based side-channel attack.
AB - Caches are integral parts in modern computers; they leverage the memory access patterns of a program to mitigate the gap between the fast processors and slow memory components. Unfortunately, the behavior of caches can be exploited by attackers to infer the program's memory access patterns, by carrying out cache-based side-channel attacks, which can leak critical information. Secure caches that were proposed employ cache partitioning or randomized memory-to-cache mapping techniques to prevent these attacks. Such techniques may add to the complexity of cache designs. In this work, we suggest the use of specialized prefetching algorithms for the purpose of protecting from cachebased side-channel attacks. Our prefetchers can be combined with conventional set associative cache designs, are simple to employ, and require low incremental hardware overhead costs, if the base prefetching scheme is already employed. We integrated our prefetching policies with commonly used GHB and stride prefetching schemes, and compared their performance with the standard implementations of those schemes, on both conventional and secure cache designs. More specifically, our results show that the use of our secure prefetching policy delivers original prefetching performance when integrated with a stride prefetcher. Finally, we demonstrate how a disruptive prefetching scheme can protect the cache from an access based side-channel attack.
KW - Cache prefetching
KW - Computer architecture. microarchitecture
KW - Secure hardware
KW - Side-channel attacks
UR - http://www.scopus.com/inward/record.url?scp=84960855788&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84960855788&partnerID=8YFLogxK
U2 - 10.1145/2757667.2757672
DO - 10.1145/2757667.2757672
M3 - Conference contribution
AN - SCOPUS:84960855788
T3 - SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference
BT - SYSTOR 2015 - Proceedings of the 8th ACM International Systems and Storage Conference
PB - Association for Computing Machinery, Inc
Y2 - 26 May 2015 through 28 May 2015
ER -