SpecWands: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
نویسندگان
چکیده
Transient Execution Attacks (TEAs) have gradually become a major security threat to modern high-performance processors. They exploit the vulnerability of speculative execution illegally access private data, and transmit them through timing-based covert channels. While new vulnerabilities are discovered continuously, channels can be categorised two types: 1) Persistent Type, in which based on layout changes buffering, e.g. caches or TLBs; 2) Volatile contention sharing resources, units issuing ports. The defenses against persistent-type been well addressed, while those for volatile-type still rather inadequate. Existing mitigation schemes volatile type such as Speculative Compression Time-Division-Multiplexing will introduce significant overhead due need stall pipeline disallow resource sharing. In this paper, we look into attacks with perspective, propose scheduling-based scheme, called SpecWands. It consists three priority-based scheduling policies prevent an attacker from transmitting secret different situations. SpecWands not only defend both inter-thread intra-thread attacks, but also keep most performance benefit resource-sharing. We evaluate its runtime SPEC 2017 benchmarks realistic programs. experimental results show that has advantage over other representative schemes.
منابع مشابه
Priority-based lambda scheduler
Optical networks provide a new dimension to meet the demands of exponentially growing traffic. Optical packet switching requires a good switch architecture, which eliminates the O/E/O conversion as much as possible. Wavelength Division Multiplexing (WDM) provides a breakthrough to exploit the huge bandwidth of the optical fiber. Different applications have different requirements, which necessit...
متن کاملPBS: A Unified Priority-Based CPU Scheduler
A novel CPU scheduling policy is designed and implemented. It is a configurable policy in the sense that a tunable parameter is provided to change its behavior. With different settings of the parameter, this policy can emulate the first-come first-serve, the processing sharing, or the feedback policies, as well as different levels of their mixtures. This policy is implemented in the Linux kerne...
متن کاملReal-time Priority Scheduler
The Real-time Priority Scheduler architectural pattern concerns real-time systems and introduces several scheduling classes representing different criticality levels for all activities of modern real-time applications. Scheduling is done according to the activities’ priorities and scheduling policies having to guarantee the execution of the most critical activities first and some fairness crite...
متن کاملEfficient Trapdoor Based Client Puzzle Against DoS Attacks
Denial of Service (DoS) attack is one of prevalent and mass-destructive threats to web servers, which aims at shutting down a target server by depleting its resource and obliging the victim incapable of offering stable and integrated service to legitimate clients. Client puzzle is proposed for a promising countermeasure against DoS attacks. In this paper, we propose a new trapdoor-based client ...
متن کاملA Skiplist-Based Concurrent Priority Queue with Minimal Memory Contention
Priority queues are fundamental to many multiprocessor applications. Several priority queue algorithms based on skiplists have been proposed, as skiplists allow concurrent accesses to different parts of the data structure in a simple way. However, for priority queues on multiprocessors, an inherent bottleneck is the operation that deletes the minimal element. We present a linearizable, lock-fre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
سال: 2023
ISSN: ['1937-4151', '0278-0070']
DOI: https://doi.org/10.1109/tcad.2023.3284290