Essays about: "speculative execution"

Showing result 1 - 5 of 6 essays containing the words speculative execution.

  1. 1. Validating Side Channel models in RISC-V using Model-Based Testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Viktor Vitek; [2021]
    Keywords : Observational model · Side-channel analysis and countermeasures · Embedded systems security · Model-based Testing; Observationsmodell · Sidokanal analys och motåtgärder · Inbyggda system säkerhet · Model-Baserad Testning;

    Abstract : Microarchitecture’s optimizations have increased the performance but lowered the security. Speculative execution is one of the optimizations that was thought to be secure, but it is exploitable to leak information. READ MORE

  2. 2. Speculative Interference: A Modern Spectre Attack

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Isak Borg; [2021]
    Keywords : Spectre; spectre attack; speculative interference; speculative execution; invisible speculation; gem5;

    Abstract : Since the Spectre family of attacks were made public knowledge in January of 2018, researchers, manufacturers and interested individuals have experimented a lot with creating defences against it. But there have also been a lot of research aimed at circumventing these defences and finding alternative side-channels and mechanisms for performing Spectre-type attacks. READ MORE

  3. 3. Improving Input Prediction in Online Fighting Games

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Anton Ehlert; [2021]
    Keywords : Fighting games; sequence prediction; machine learning; speculative execution; Fightingspel; sekvensförutsägelse; maskininlärning; spekulativ exekvering;

    Abstract : Many online fighting games use rollback netcode in order to compensate for network delay. Rollback netcode allows players to experience the game as having reduced delay. A drawback of this is that players will sometimes see the game quickly ”jump” to a different state to adjust for the the remote player’s actions. READ MORE

  4. 4. Design Space Exploration for Value Prediction in Security Applications

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Linnea Gunnarsson; [2019]
    Keywords : Spectre; Meltdown; Value prediction;

    Abstract : With the introduction of Spectre and Meltdown, two new attacks thattarget the speculative instructions due to Out-of-Order execution intoday's processors, a new way to handle speculative loads has beenproposed. Instead of performing the speculative load, the approach isto predict them. This is a new way to use value predictors. READ MORE

  5. 5. Two-phase WCET analysis for cache-based symmetric multiprocessor systems

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Rodothea Myrsini Tsoupidi; [2017]
    Keywords : Worst-Case Execution Time Analysis; Abstract Domain; Real-Time Systems; Low-level Analysis; Pipeline Analysis; Cache-based Analysis; Multiprocessor Analysis; Längsta Exekveringstid Analys; WCET; Abstrakt Domän; Realtidsystem; Låg-nivå Analys; Pipeline Analys; Cachebaserad Analys;

    Abstract : The estimation of the worst-case execution time (WCET) of a task is a problem that concerns the field of embedded systems and, especially, real-time systems. Estimating a safe WCET for single-core architectures without speculative mechanisms is a challenging task and an active research topic. READ MORE