2015
DOI: 10.1147/jrd.2014.2374252
|View full text |Cite
|
Sign up to set email alerts
|

Advanced features in IBM POWER8 systems

Abstract: The IBM POWER8i processor includes many innovative features that enable efficient and flexible computing, along with enhancements in virtualization, security, and serviceability. These features benefit application performance, and big data and analytics computing, as well as the cloud environment. Notable features include the capabilities to dynamically and efficiently change the number of threads active on a processor, enhancing application performance via integer vector operations, encryption accelerations, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Leveraging the contention in memory resources including caches and TLBs etc., Wang et al implemented a traditional prime+probe attack which is more fine-grained and powerful on SGX-enabled platforms. (Sinharoy et al 2015). The functions of these subsystems include managing the boot process, keeping the system under thermal limits, and running based on user input modes and parameters.…”
Section: Logical Isolation Suffers From Information Leak Through Physmentioning
confidence: 99%
See 1 more Smart Citation
“…Leveraging the contention in memory resources including caches and TLBs etc., Wang et al implemented a traditional prime+probe attack which is more fine-grained and powerful on SGX-enabled platforms. (Sinharoy et al 2015). The functions of these subsystems include managing the boot process, keeping the system under thermal limits, and running based on user input modes and parameters.…”
Section: Logical Isolation Suffers From Information Leak Through Physmentioning
confidence: 99%
“…On other hand, the complexity provides an attacker with a good chance to compromise the subsystem. On the other hand, the subsystem is implemented with embedded processors (Sinharoy et al 2015; Datenschutz and Pataky 2017; Advanced Micro Devices 2018b) which usually lack the common security hardening such as stack cookies, No-eXecute (NX) flags, or address space layout randomization (ASLR). Hence, there is also a security gap between the security requirements and the current security hardening.…”
Section: Logical Isolation Suffers From Information Leak Through Physmentioning
confidence: 99%
“…Beyond these foundational protocol improvements to single-thread and system-wide scaling for shared data and volatile-translation contexts, several hardware capabilities have been added to the cache hierarchy to directly enable high-value system software, middleware, and application features, as described in [8]. Such features include micro-partition prefetch and support for multiple concurrent partitions on a core, both of which enable higher performance for many smaller partitions, as well as the hardware-managed reference-history array to improve virtual-memory management.…”
Section: Figurementioning
confidence: 99%
“…15 Each POWER8 core is equipped with private L1 and L2 caches of 64 Kbytes and 512 Kbytes, respectively. The L3 cache is shared, and each core has fast access to an 8-Mbyte slice.…”
Section: Performance Evaluationmentioning
confidence: 99%