We present a low-overhead method for accurately measuring application performance (CPI) and off-chip bandwidth (GB/s) as a function of its the available shared cache capacity, on real hardware, with no modifications to the application or operating system. We accomplish this by co-running a Pirate application that“steals”cache space with the Target application. By adjusting how much space the Pirate steals during the Target’s execution, and using hardware performance counters to record the Target’s performance, we can accurately and efficiently capture performance data for the Target application as a function of its available shared cache. At the same time we use performance counters to monitor the Pirate to ensure that it is successfully st...
The context of this work are performance models of software systems, which are used for predicting p...
There is an ever widening performance gap between processors and main memory, a gap bridged by small...
(Under the direction of Assistant Professor Dr. Frank Mueller). Over recent decades, computing speed...
To reduce latency and increase bandwidth to memory, modern microprocessors are designed with deep me...
Cache pirating is a low-overhead method created by the Uppsala Architecture Research Team (UART) to ...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
On multicore processors, co-executing applications compete for shared resources, such as cache capac...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...
Memory contention is one of the largest sources of inter-core interference in statically partitioned...
Shared cache contention can cause significant variabil-ity in the performance of co-running applicat...
Shared cache contention can cause significant variability in the performance of co-running applicati...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
Modern chip-level multiprocessors (CMPs) contain multiple processor cores sharing a common last-leve...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
The context of this work are performance models of software systems, which are used for predicting p...
There is an ever widening performance gap between processors and main memory, a gap bridged by small...
(Under the direction of Assistant Professor Dr. Frank Mueller). Over recent decades, computing speed...
To reduce latency and increase bandwidth to memory, modern microprocessors are designed with deep me...
Cache pirating is a low-overhead method created by the Uppsala Architecture Research Team (UART) to ...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
On multicore processors, co-executing applications compete for shared resources, such as cache capac...
We introduce the usage of hardware performance counters (HPCs) as a new method that allows very prec...
Memory contention is one of the largest sources of inter-core interference in statically partitioned...
Shared cache contention can cause significant variabil-ity in the performance of co-running applicat...
Shared cache contention can cause significant variability in the performance of co-running applicati...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Cache timing attacks use shared caches in multi-core processors as side channels to extract informat...
Modern chip-level multiprocessors (CMPs) contain multiple processor cores sharing a common last-leve...
Since cache side-channel attacks have been serious security threats to multi-tenant systems, there h...
The context of this work are performance models of software systems, which are used for predicting p...
There is an ever widening performance gap between processors and main memory, a gap bridged by small...
(Under the direction of Assistant Professor Dr. Frank Mueller). Over recent decades, computing speed...