【摘 要】
:
In a modern processor,branch prediction is crucial in effectively exploiting the instruction-level parallelism for high-performance execution.However,recently exposed vulnerabilities reveal the urgency to improve the security of branch predictors.The vita
【机 构】
:
State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of
论文部分内容阅读
In a modern processor,branch prediction is crucial in effectively exploiting the instruction-level parallelism for high-performance execution.However,recently exposed vulnerabilities reveal the urgency to improve the security of branch predictors.The vital cause of the branch predictor vulnerabilities is that the update strategy of the saturating counter is deterministic.As a fundamental building block in a modern branch predictor,previous studies have paid too much attention to the performance and hardware cost and ignored the security of saturating counter.This leaves attackers with the opportunities to perform side-channel attacks on the branch predictor.This paper focuses on the saturating counter to explore a secure and lightweight design to mitigate branch predictor side-channel attacks.Instead of applying the isolation mechanism to branch predictor resources,we propose a novel probabilistic saturating counter design to confuse the attacker\'s perception of the victim\'s behaviour.It changes the conventional deterministic state transition function to a probabilistic state transition function.When a branch is committed,the conventional saturating counter needs to be updated about whether the prediction results are correct or not.While for the probabilistic saturating counter,the branch predictor determines whether the update is performed based on the update probability.The probabilistic saturating counter dramatically reduces the ability of the attacker to spy the saturating counter\'s state.Our analyses using a cycle-accurate simulator suggest that the proposed mechanism incurs 2.4% performance overhead and hardware cost while providing strong protection.
其他文献
DOI:10.16644/j.cnki.cn33-1094/tp.2021.11.008 摘 要: 单通道信号源个数估计是单通道盲源分离问题的前提与难点,传统方法无法直接进行估计且准确率较低。文章提出了一种基于深度网络分类器的单通道信号源估计方法。该方法将源个数估计作为分类问题,在经典CNN的基础上引入一维卷积网络与残差结构作为分类器,采用短时傅里叶变换和梅尔倒谱系数作为联合特征输入分类器。在L
砷、氟污染水体及其共存问题是环境领域的热点问题,长期暴露其中对公众的身体健康存在巨大威胁.文章梳理了砷、氟污染物的来源,及砷、氟污染水体的分布与危害,并按吸附、离子交换、反渗透、电絮凝、膜法等分析了用于砷、氟处理的各类技术手段的利弊,以期为后续水体中砷、氟污染物的高效去除提供参考.
2020年6月,美国教育部国家教育统计中心推出了报告《数据治理指南》.该报告可以为大数据时代我国教育数据治理发展提供一定的借鉴与启示.通过对该报告的深入分析,发现报告具有如下特色:报告是美国教育数据治理最新成果与理论的发展;明确教育数据治理是一个系统工程,贯穿于教育数据的整个生命周期等.报告提出的观点及案例可以给我国大数据时代教育数据治理提供一定的启示与参考.
DOI:10.16644/j.cnki.cn33-1094/tp.2021.11.017 摘 要: 为了在学分制下提高离散数学课程的教学效果,阐述了离散数学课程的基本特点,分析了在完全学分制下该课程面临的新的挑战和问题,提出课后辅助教学将成为影响整体教学效果极为重要的因素的观点。文章对利用互联网、增加自主小测验、增加大作业模块以及改进考核机制四个方面的课后辅助教学方法进行了初步探讨。 关键词:
Massive ocean data acquired by various observing platforms and sensors poses new challenges to data mana-gement and utilization.Typically,it is difficult to find the desired data from the large amount of datasets efficiently and effectively.Most of existi
DOI:10.16644/j.cnki.cn33-1094/tp.2021.11.005 摘 要: 传统RSSI测距模型在移动机器人对使用者进行定位时存在依赖环境参数和不能辨别目标方位等问题,因此提出一种基于BP神经网络的测距定位方法。该方法采用了RSSI测距模型和超声波测距模型,利用测距定位模块收集到的RSSI值与超声波数据作为输入对BP神经网络进行训练。实验结果表明,该方法有效地解决了传统R
随着城镇化的高速发展,城市边缘不断向外扩张,地上污水处理厂普遍存在处理能力不足和臭气、噪声等二次污染的邻避效应的问题.地下污水处理厂具有占地空间小、环境友好、土地综合利用价值高等优势,在我国城市水环境保护和城市可持续发展中发挥着重要的作用.文中通过研究国内地下污水处理厂的关键技术和工程案例,分析地下式污水处理厂的技术特征和亟待解决的难题,为地下污水处理厂的建设提供技术参考.
竹园污水处理厂四期工程建成后,进水量可能长期处于设计规模的30%~90%.因此,设置了进水量为设计规模40%和70%的低流量组和高流量组厌氧-缺氧-好氧(anaerobic-anoxic-oxic,AAO)中试反应器,用以模拟典型工况,从而为竹园四期工程和竹园片区的水量调度提供理论依据.在约2倍污泥龄的运行周期中,低流量组和高流量组反应器出水化学需氧量(COD)和氨氮浓度可稳定达到一级A标准;高流量组出水总氮(TN)浓度可稳定达到一级A标准,略优于低流量组;两组出水总磷(TP)浓度均无法达到一级A标准,建
DOI:10.16644/j.cnki.cn33-1094/tp.2021.11.015 摘 要: 文件恢复对电子取证行业非常重要,而文件签名恢复文件是一种常用的文件恢复方法。其过程是,搜索文件签名以确定文件起始扇区号;根据文件签名尾或大小来估算文件的结尾扇区号;把起始和结尾扇区之间的内容复制生成一个新文件即可得到被删文件。如果文件在数据区中是连续存放的,该恢复方法的成功率非常高。文章以FAT3
High-energy particles in the space can easily cause soft error in register file (RF).As a critical structure in a processor,RF often stores data for long periods of time and is read frequently,resulting in a higher probability of spreading corrupted data