期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An Optimized Resource Scheduling Strategy for Hadoop Speculative Execution Based on Non-cooperative Game Schemes
1
作者 Yinghang Jiang Qi Liu +3 位作者 Williams Dannah Dandan Jin Xiaodong Liu Mingxu Sun 《Computers, Materials & Continua》 SCIE EI 2020年第2期713-729,共17页
Hadoop is a well-known parallel computing system for distributed computing and large-scale data processes.“Straggling”tasks,however,have a serious impact on task allocation and scheduling in a Hadoop system.Speculat... Hadoop is a well-known parallel computing system for distributed computing and large-scale data processes.“Straggling”tasks,however,have a serious impact on task allocation and scheduling in a Hadoop system.Speculative Execution(SE)is an efficient method of processing“Straggling”Tasks by monitoring real-time running status of tasks and then selectively backing up“Stragglers”in another node to increase the chance to complete the entire mission early.Present speculative execution strategies meet challenges on misjudgement of“Straggling”tasks and improper selection of backup nodes,which leads to inefficient implementation of speculative executive processes.This paper has proposed an Optimized Resource Scheduling strategy for Speculative Execution(ORSE)by introducing non-cooperative game schemes.The ORSE transforms the resource scheduling of backup tasks into a multi-party non-cooperative game problem,where the tasks are regarded as game participants,whilst total task execution time of the entire cluster as the utility function.In that case,the most benefit strategy can be implemented in each computing node when the game reaches a Nash equilibrium point,i.e.,the final resource scheduling scheme to be obtained.The strategy has been implemented in Hadoop-2.x.Experimental results depict that the ORSE can maintain the efficiency of speculative executive processes and improve fault-tolerant and computation performance under the circumstances of Normal Load,Busy Load and Busy Load with Skewed Data. 展开更多
关键词 Distributed computing speculative execution resource scheduling non-cooperative game theory
在线阅读 下载PDF
TLBshield:A Secure Reinforce on Translation Lookaside Buffer With Security and Performance Trade-Off to Mitigate the Speculative Attacks
2
作者 YUYANG LIU RUNYE DING +3 位作者 YUJIE CHEN PUJIN XIE YAO LIU ZHIYI YU 《Integrated Circuits and Systems》 2025年第3期158-166,共9页
Since the discovery of speculative execution attacks based on side channels,there has been a long history of research on their attack mechanisms and defense principles.To explore TLB side channels,we constructed a Sys... Since the discovery of speculative execution attacks based on side channels,there has been a long history of research on their attack mechanisms and defense principles.To explore TLB side channels,we constructed a System-on-Chip(SoC)centered around the XuanTie C910 processor on a Virtex UltraScale+HBM VCU128 FPGA and ran the Linux operating system on this platform.We successfully implemented the Spectre-v1 attack targeting the multi-level TLB structure of the XuanTie C910 processor,identifying the second-level TLB as the primary target of the attack.In addition,we proposed a defense mechanism called TLBshield-v1,which employs a 50-percent block rate policy on the write-back channel from the Page Table Walker to the second-level TLB,thereby mitigating all attacks based on the second-level TLB.We tested a 50-percent block rate policy,which reduced the success rate of the Spectre-v1 attack from 100 percent to 55.7 percent,with a performance overhead of only 1.77 percent.Furthermore,we designed TLBshield-v2,with different block rates of second-level TLB,tested their corresponding performance overheads and security implications,and introduced a normalized evaluation metric,Security-Versus-Performance to determine the optimal design strategy that balances performance overhead and security under varying security requirements. 展开更多
关键词 Computer security FPGA spectre attack speculative execution attack SYSTEM-ON-CHIP translation lookaside buffer
在线阅读 下载PDF
Secure Speculation via Speculative Secret Flow Tracking
3
作者 崔宏伟 杨春 程旭 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第2期422-438,共17页
Speculative execution attacks can leak arbitrary program data under malicious speculation,presenting a severe security threat.Based on two key observations,this paper presents a software-transparent defense mechanism ... Speculative execution attacks can leak arbitrary program data under malicious speculation,presenting a severe security threat.Based on two key observations,this paper presents a software-transparent defense mechanism called speculative secret flow tracking(SSFT),which is capable of defending against all cache-based speculative execution attacks with a low performance overhead.First,we observe that the attacker must use array or pointer variables in the victim code to access arbitrary memory data.Therefore,we propose a strict definition of secret data to reduce the amount of data to be protected.Second,if the load is not data-dependent and control-dependent on secrets,its speculative execution will not leak any secrets.Thus,this paper introduces the concept of speculative secret flow to analyze how secret data are obtained and propagated during speculative execution.By tracking speculative secret flow in hardware,SSFT can identify all unsafe speculative loads(USLs)that are dependent on secrets.Moreover,SSFT exploits three different methods to constrain USLs’speculative execution and prevent them from leaking secrets into the cache and translation lookaside buffer(TLB)states.This paper evaluates the performance of SSFT on the SPEC CPU 2006 workloads,and the results show that SSFT is effective and its performance overhead is very low.To defend against all speculative execution attack variants,SSFT only incurs an average slowdown of 4.5%(Delay USL-L1Miss)or 3.8%(Invisible USLs)compared to a non-secure processor.Our analysis also shows that SSFT maintains a low hardware overhead. 展开更多
关键词 cache side channel attack HARDWARE speculative execution attack security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部