Mitigating the Cache Data Pollution by Using Branch Path Tracking

被引:0
|
作者
Liu Song-He [1 ]
Song Huan-Sheng [1 ]
Qi Shu-Min [1 ]
Zhang Jun
机构
[1] Chang An Univ, Dept Informat Engn, Xian 710064, Peoples R China
关键词
Branch Prediction; Speculative Accessing; Cache; Pollution;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
"Memory Wall" is one of the most important problems which must be solved for designing high performance processors. Efficient and intelligent cache system is key component of processor's memory system. We notice that cache pollution caused by the speculative execution of memory accessing instructions in predictive path may affect the cache and processor performance seriously. Based on the analyses of the impacts of speculative execution and cache data pollution to processor performance, this paper proposes a cache pollution control technique by using branch paths tracking, which is called Contra. Firstly, we construct a branch paths tracking table to follow the cache data written by memory accessing instructions in speculative branch paths. Then, processing of storage, accessing and replacement to these data are particularly controlled in order to mitigate influence of data pollution to cache system and processor performance. Simulation result indicates that, Contra technique eliminates cache pollution and upgrades performance effectively. Relative to the baseline architecture, D-Cache hit rate increases from 0.03% to 6.69%, average 1.80%. Improvement of IPC ranges from 0.01% to 6.60%, average 2.56%.
引用
收藏
页码:574 / 578
页数:5
相关论文
共 50 条
  • [11] Branch-directed and stride-based data cache prefetching
    Liu, Y
    Kaeli, DR
    INTERNATIONAL CONFERENCE ON COMPUTER DESIGN - VLSI IN COMPUTERS AND PROCESSORS, PROCEEDINGS, 1996, : 225 - 230
  • [12] A trust-based method for mitigating cache poisoning in Name Data Networking
    Rezaeifar, Zeinab
    Wang, Jian
    Oh, Heekuck
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 : 117 - 132
  • [13] Mitigating Data Cache Aging through Compiler-Driven Memory Allocation
    Oehlert, Dominic
    Luppold, Arno
    Falk, Heiko
    SCOPES '18: PROCEEDINGS OF THE 21ST INTERNATIONAL WORKSHOP ON SOFTWARE AND COMPILERS FOR EMBEDDED SYSTEMS, 2018, : 58 - 61
  • [14] Detection of Cache Pollution Attacks Using Randomness Checks
    Park, Hyundo
    Widjaja, Indra
    Lee, Heejo
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [15] Detecting Cache Pollution Attacks Using Bloom Filter
    Ashihara, Takakazu
    Kamiyamat, Noriaki
    2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (LANMAN), 2021,
  • [16] WSN-based target path simulation using incomplete tracking data
    Essaddi, Nejla
    Hamdi, Mohamed
    Boudriga, Noureddine
    International Journal of Simulation: Systems, Science and Technology, 2009, 10 (04): : 38 - 45
  • [17] A lightweight mechanism for detection of cache pollution attacks in Named Data Networking
    Conti, Mauro
    Gasti, Paolo
    Teoli, Marco
    COMPUTER NETWORKS, 2013, 57 (16) : 3178 - 3191
  • [18] A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture
    Hidouri, Abdelhak
    Touati, Haifa
    Hadded, Mohamed
    Hajlaoui, Nasreddine
    Muhlethaler, Paul
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, 2022, 449 : 435 - 446
  • [19] Atmospheric Pollution Retrieval Using Path Radiance Derived from Remote Sensing Data
    Ajay Roy
    Journal of Geovisualization and Spatial Analysis, 2021, 5
  • [20] Atmospheric Pollution Retrieval Using Path Radiance Derived from Remote Sensing Data
    Roy, Ajay
    JOURNAL OF GEOVISUALIZATION AND SPATIAL ANALYSIS, 2021, 5 (02)