Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019Cataloged from PDF version of thesis.Includes bibliographical references (pages 123-139).Indirect memory references hobble efficient and secure execution on current processor architectures. Traditional hardware techniques such as caches and speculative execution are ineffective on demanding workloads, such as in-memory databases, machine learning, and graph analytics. While terabytes of DRAM are now available in public cloud machines, indirect memory references in large working sets often incur the full penalty of a random DRAM access. Furthermore, caches and speculative execution enable the recently discovered Spectre famil...
Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructio...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
One of the main performance bottlenecks of processors today is the discrepancy between processor and...
The gap between CPU and main memory speeds has long been a performance bottleneck. As we move toward...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Modern processors rely heavily on speculation to provide performance. Techniques such as branch pred...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
With the advent of chip-multiprocessors (CMPs), Thread-Level Speculation (TLS) remains a promising t...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Dependences among loads and stores whose addresses are unknown hinder the extraction of instruction ...
Despite rapid increases in CPU performance, the primary obstacles to achieving higher performance in...
Recent proposals for multithreaded architectures employ speculative execution to allow threads with ...
Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructio...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
One of the main performance bottlenecks of processors today is the discrepancy between processor and...
The gap between CPU and main memory speeds has long been a performance bottleneck. As we move toward...
Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, ...
Modern processors rely heavily on speculation to provide performance. Techniques such as branch pred...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
With the advent of chip-multiprocessors (CMPs), Thread-Level Speculation (TLS) remains a promising t...
Speculative out-of-order execution is one of the fundamental building blocks of modern, high-perform...
Dependences among loads and stores whose addresses are unknown hinder the extraction of instruction ...
Despite rapid increases in CPU performance, the primary obstacles to achieving higher performance in...
Recent proposals for multithreaded architectures employ speculative execution to allow threads with ...
Out-of-order processors heavily rely on speculation to achieve high performance, allowing instructio...
Cache attacks have increasingly gained momentum in the security community. In such attacks, attacker...
Virtual memory is a classic computer science abstraction and is ubiquitous in all scales of computin...