Sandhya Dwarkadas
YOU?
Author Swipe
View article: RollingCache: Using Runtime Behavior to Defend Against Cache Side Channel Attacks
RollingCache: Using Runtime Behavior to Defend Against Cache Side Channel Attacks Open
Shared caches are vulnerable to side channel attacks through contention in cache sets. Besides being a simple source of information leak, these side channels form useful gadgets for more sophisticated attacks that compromise the security o…
View article: Author Index
Author Index Open
View article: Performance monitoring for new phase dynamic optimization of instruction dispatch cluster configuration
Performance monitoring for new phase dynamic optimization of instruction dispatch cluster configuration Open
In a processor having multiple clusters which operate in parallel, the number of clusters in use can be varied dynamically. At the start of each program phase, the configuration option for an interval is run to determine the optimal config…
View article: Blast from the Past: Least Expected Use (LEU) Cache Replacement with Statistical History
Blast from the Past: Least Expected Use (LEU) Cache Replacement with Statistical History Open
Cache replacement policies typically use some form of statistics on past access behavior. As a common limitation, however, the extent of the history being recorded is limited to either just the data in cache or, more recently, a larger but…
View article: The Impact of Page Size and Microarchitecture on Instruction Address Translation Overhead
The Impact of Page Size and Microarchitecture on Instruction Address Translation Overhead Open
As the volume of data processed by applications has increased, considerable attention has been paid to data address translation overheads, leading to the widespread use of larger page sizes (“superpages”) and multi-level translation lookas…
View article: Multi-cluster processor operating only select number of clusters during each phase based on program statistic monitored at predetermined intervals
Multi-cluster processor operating only select number of clusters during each phase based on program statistic monitored at predetermined intervals Open
In a processor having multiple clusters which operate in parallel, the number of clusters in use can be varied dynamically. At the start of each program phase, the configuration option for an interval is run to determine the optimal config…
View article: Interference and Need Aware Workload Colocation in Hyperscale Datacenters
Interference and Need Aware Workload Colocation in Hyperscale Datacenters Open
Datacenters suffer from resource utilization inefficiencies due to the conflicting goals of service owners and platform providers. Service owners intending to maintain Service Level Objectives (SLO) for themselves typically request a conse…
View article: MAPPER: Managing Application Performance via Parallel Efficiency Regulation
MAPPER: Managing Application Performance via Parallel Efficiency Regulation Open
State-of-the-art systems, whether in servers or desktops, provide ample computational and storage resources to allow multiple simultaneously executing potentially parallel applications. However, performance tends to be unpredictable, being…
View article: TimeCache: Using Time to Eliminate Cache Side Channels when Sharing Software
TimeCache: Using Time to Eliminate Cache Side Channels when Sharing Software Open
Timing side channels have been used to extract cryptographic keys and sensitive documents, even from trusted enclaves. In this paper, we focus on cache side channels created by access to shared code or data in the memory hierarchy. This vu…
View article: Performance Characterization of HTAP Workloads
Performance Characterization of HTAP Workloads Open
Hybrid Transactional and Analytical Processing (HTAP) systems have become popular in the past decade. HTAP systems allow running transactional and analytical processing workloads on the same data and hardware. As a result, they suffer from…
View article: Top Picks in Computer Architecture from Conferences in 2018
Top Picks in Computer Architecture from Conferences in 2018 Open
The author introduces the top picks selection of papers in computer architecture that were published in 2018. This is the 16th year of publication of what has now become a tradition in the computer architecture community. Each year, the MI…
View article: 2018 Maurice Wilkes Award Given to Gabriel Loh
2018 Maurice Wilkes Award Given to Gabriel Loh Open
Gabriel Loh was the 2018 recipient of the ACM SIGARCH Maurice Wilkes award in recognition of his contributions to the advancement of die-stacked architectures. The Maurice Wilkes award is given annually to an early career researcher for an…
View article: Spectres, virtual ghosts, and hardware support
Spectres, virtual ghosts, and hardware support Open
Side-channel attacks, such as Spectre and Meltdown, that leverage speculative execution pose a serious threat to computing systems. Worse yet, such attacks can be perpetrated by compromised operating system (OS) kernels to bypass defenses …
View article: The Grad Cohort Workshop: Evaluating an Intervention to Retain Women Graduate Students in Computing
The Grad Cohort Workshop: Evaluating an Intervention to Retain Women Graduate Students in Computing Open
Women engaged in computing career tracks are vastly outnumbered by men and often must contend with negative stereotypes about their innate technical aptitude. Research suggests women's marginalized presence in computing may result in women…