A key problem facing current computing systems is the inability to autonomously manage security vulnerabilities as well as more mundane errors. Since the design of computer architectures is usually performance-driven, hardware often lacks primitives for tasks in which raw speed is not the primary goal. There is little architectural support for monitoring execution at the instruction level, and no mechanisms for assisting an automated response. This paper advocates modifying general-purpose processors to provide both program supervision and automatic response via a policy-driven monitoring mechanism and instruction stream rewriting, respectively. These capabilities form the basis of speculative virtual verification (SVV).SVV is a model for t...
A superscalar processor supporting speculative ex-ecution requires an instruction fetch mechanism th...
Speculative execution is an optimization technique that has been part of CPUs for over a decade. It ...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...
We propose architectural contracts that specify the allowable limits of speculative execution to ena...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Speculative execution allows CPUs to improve performance by using prediction mechanisms that predic...
Modern processors employ different speculation mechanisms to speculate over different kinds of inst...
To achieve good performance on modern hardware, software must be designed with a high degree of para...
Side-channel attacks based on speculative execution access sensitive data and use transmitters to le...
The available instruction level parallelism (ILP) is extremely limited within basic blocks of non-nu...
Compiler-controlled speculative execution has been shown to be effective in increasing the available...
Current trends in processor design are pointing to deeper and wider pipelines and superscalar archit...
The thesis of this work is that eliminating speculation is a feasible approach to mitigating the tra...
Although compiler optimization techniques are standard and successful in non-real-time systems, if n...
A superscalar processor supporting speculative ex-ecution requires an instruction fetch mechanism th...
Speculative execution is an optimization technique that has been part of CPUs for over a decade. It ...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...
We propose architectural contracts that specify the allowable limits of speculative execution to ena...
Software faults and vulnerabilities continue to present significant obstacles to achieving reliable ...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Speculative execution allows CPUs to improve performance by using prediction mechanisms that predic...
Modern processors employ different speculation mechanisms to speculate over different kinds of inst...
To achieve good performance on modern hardware, software must be designed with a high degree of para...
Side-channel attacks based on speculative execution access sensitive data and use transmitters to le...
The available instruction level parallelism (ILP) is extremely limited within basic blocks of non-nu...
Compiler-controlled speculative execution has been shown to be effective in increasing the available...
Current trends in processor design are pointing to deeper and wider pipelines and superscalar archit...
The thesis of this work is that eliminating speculation is a feasible approach to mitigating the tra...
Although compiler optimization techniques are standard and successful in non-real-time systems, if n...
A superscalar processor supporting speculative ex-ecution requires an instruction fetch mechanism th...
Speculative execution is an optimization technique that has been part of CPUs for over a decade. It ...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...