2019 IEEE International Symposium on High Performance Computer Architecture (HPCA) 2019
DOI: 10.1109/hpca.2019.00058
|View full text |Cite
|
Sign up to set email alerts
|

BRB: Mitigating Branch Predictor Side-Channels

Abstract: Modern processors use branch prediction as an optimization to improve processor performance. Predictors have become larger and increasingly more sophisticated in order to achieve higher accuracies which are needed in high performance cores. However, branch prediction can also be a source of side channel exploits, as one context can deliberately change the branch predictor state and alter the instruction flow of another context. Current mitigation techniques either sacrifice performance for security, or fail to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…-BRB: No encryption. Although the original BRB mechanism [43] replicates only directional predictors (bimodal and TAGE), we can apply a retention buffer to the BTB as well. As shown in Table 3 Note that we do not assume any specific epoch length, but try to show the performance impact of different epoch lengths.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…-BRB: No encryption. Although the original BRB mechanism [43] replicates only directional predictors (bimodal and TAGE), we can apply a retention buffer to the BTB as well. As shown in Table 3 Note that we do not assume any specific epoch length, but try to show the performance impact of different epoch lengths.…”
Section: Resultsmentioning
confidence: 99%
“…6.2.6 Checkpoint. BRB [43] is the state-of-the-art branch predictor side-channel mitigation. BRB maintains a small checkpoint (1.5 to 3KB) of branch predictor states for each context upon context switches and restores it once the context becomes active.…”
Section: Encryption Scattercachementioning
confidence: 99%
See 1 more Smart Citation
“…x Prevent malicious training. BRB [43] allocates separate branch predictor tables for different process to defend against training across process. SPECCFI [44] embeds Control Flow Integrity (CFI) principles into the branch prediction decisions to constrain dangerous speculation.…”
Section: Related Workmentioning
confidence: 99%
“…Despite significant efforts directed towards designing other secure microarchitectural components e.g., caches [14], [31], [43], [63], [76], [78], [80] and memory buses [4], [40], [66], secure BPU designs remain a handful of attempts [20], [38], [77]. More importantly, none of existing approaches completely eliminate BPU vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%