Skip to main content

Showing 1–3 of 3 results for author: Diavastos, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.11291  [pdf, other

    cs.CR cs.AR

    Mitigating Speculation-based Attacks through Configurable Hardware/Software Co-design

    Authors: Ali Hajiabadi, Archit Agarwal, Andreas Diavastos, Trevor E. Carlson

    Abstract: New speculation-based attacks that affect large numbers of modern systems are disclosed regularly. Currently, CPU vendors regularly fall back to heavy-handed mitigations like using barriers or enforcing strict programming guidelines resulting in significant performance overhead. What is missing is a solution that allows for efficient mitigation and is flexible enough to address both current and fu… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: 13 pages, 15 figures

  2. arXiv:2109.03112  [pdf, other

    cs.AR

    Efficient Instruction Scheduling using Real-time Load Delay Tracking

    Authors: Andreas Diavastos, Trevor E. Carlson

    Abstract: Many hardware structures in today's high-performance out-of-order processors do not scale in an efficient way. To address this, different solutions have been proposed that build execution schedules in an energy-efficient manner. Issue time prediction processors are one such solution that use data-flow dependencies and predefined instruction latencies to predict issue times of repeated instructions… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 13 pages, 11 figures, 4 tables

  3. arXiv:2107.11336  [pdf, other

    cs.CR cs.AR

    Mitigating Power Attacks through Fine-Grained Instruction Reordering

    Authors: Yun Chen, Ali Hajiabadi, Romain Poussier, Andreas Diavastos, Shivam Bhasin, Trevor E. Carlson

    Abstract: Side-channel attacks are a security exploit that take advantage of information leakage. They use measurement and analysis of physical parameters to reverse engineer and extract secrets from a system. Power analysis attacks in particular, collect a set of power traces from a computing device and use statistical techniques to correlate this information with the attacked application data and source c… ▽ More

    Submitted 23 July, 2021; originally announced July 2021.

    Comments: 13 pages, 12 figures