Skip to main content

Showing 1–7 of 7 results for author: Gratz, P V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2508.16868  [pdf, ps, other

    cs.CR cs.AR

    Targeted Wearout Attacks in Microprocessor Cores

    Authors: Joshua Mashburn, Johann Knechtel, Florian Klemme, Hussam Amrouch, Ozgur Sinanoglu, Paul V. Gratz

    Abstract: Negative-Bias Temperature Instability is a dominant aging mechanism in nanoscale CMOS circuits such as microprocessors. With this aging mechanism, the rate of device aging is dependent not only on overall operating conditions, such as heat, but also on user controllable inputs to the transistors. This dependence on input implies a possible timing fault-injection attack wherein a targeted path of l… ▽ More

    Submitted 22 August, 2025; originally announced August 2025.

    Comments: 13 pages, 11 figures, submitted to IEEE International Symposium on High-Performance Computer Architecture 2026 (HPCA-32)

  2. arXiv:2408.12592  [pdf, other

    cs.AR

    Exposing Shadow Branches

    Authors: Chrysanthos Pepi, Bhargav Reddy Godala, Krishnam Tibrewala, Gino Chacon, Paul V. Gratz, Daniel A. Jiménez, Gilles A. Pokam, David I. August

    Abstract: Modern processors implement a decoupled front-end in the form of Fetch Directed Instruction Prefetching (FDIP) to avoid front-end stalls. FDIP is driven by the Branch Prediction Unit (BPU), relying on the BPU's accuracy and branch target tracking structures to speculatively fetch instructions into the Instruction Cache (L1I). As data center applications become more complex, their code footprints a… ▽ More

    Submitted 19 December, 2024; v1 submitted 22 August, 2024; originally announced August 2024.

  3. arXiv:2408.05912  [pdf, other

    cs.AR

    Correct Wrong Path

    Authors: Bhargav Reddy Godala, Sankara Prasad Ramesh, Krishnam Tibrewala, Chrysanthos Pepi, Gino Chacon, Svilen Kanev, Gilles A. Pokam, Daniel A. Jiménez, Paul V. Gratz, David I. August

    Abstract: Modern OOO CPUs have very deep pipelines with large branch misprediction recovery penalties. Speculatively executed instructions on the wrong path can significantly change cache state, depending on speculation levels. Architects often employ trace-driven simulation models in the design exploration stage, which sacrifice precision for speed. Trace-driven simulators are orders of magnitude faster th… ▽ More

    Submitted 11 August, 2024; originally announced August 2024.

    Comments: 5 pages, 7 Figures, Submited to Computer Architecture Letters

  4. arXiv:2305.02918  [pdf, other

    cs.NI

    Flow Correlator: A Flow Table Cache Management Strategy

    Authors: Luke McHale, Paul V Gratz, Alex Sprintson

    Abstract: Switching, routing, and security functions are the backbone of packet processing networks. Fast and efficient processing of packets requires maintaining the state of a large number of transient network connections. In particular, modern stateful firewalls, security monitoring devices, and software-defined networking (SDN) programmable dataplanes require maintaining stateful flow tables. These flow… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: 26 pages, 22 figures

  5. arXiv:2210.14324  [pdf, other

    cs.AR

    The Championship Simulator: Architectural Simulation for Education and Competition

    Authors: Nathan Gober, Gino Chacon, Lei Wang, Paul V. Gratz, Daniel A. Jimenez, Elvira Teran, Seth Pugsley, Jinchun Kim

    Abstract: Recent years have seen a dramatic increase in the microarchitectural complexity of processors. This increase in complexity presents a twofold challenge for the field of computer architecture. First, no individual architect can fully comprehend the complexity of the entire microarchitecture of the core. This leads to increasingly specialized architects, who treat parts of the core outside their par… ▽ More

    Submitted 25 October, 2022; originally announced October 2022.

  6. arXiv:2210.00058  [pdf, other

    cs.CR cs.AR

    Hardware Trojan Threats to Cache Coherence in Modern 2.5D Chiplet Systems

    Authors: Gino A. Chacon, Charles Williams, Johann Knechtel, Ozgur Sinanoglu, Paul V. Gratz

    Abstract: As industry moves toward chiplet-based designs, the insertion of hardware Trojans poses a significant threat to the security of these systems. These systems rely heavily on cache coherence for coherent data communication, making coherence an attractive target. Critically, unlike prior work, which focuses only on malicious packet modifications, a Trojan attack that exploits coherence can modify dat… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

  7. FPGA-based Hyrbid Memory Emulation System

    Authors: Fei Wen, Mian Qin, Paul V. Gratz, A. L. Narasimha Reddy

    Abstract: Hybrid memory systems, comprised of emerging non-volatile memory (NVM) and DRAM, have been proposed to address the growing memory demand of applications. Emerging NVM technologies, such as phase-change memories (PCM), memristor, and 3D XPoint, have higher capacity density, minimal static power consumption and lower cost per GB. However, NVM has longer access latency and limited write endurance as… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.