Memory management ≈ Memory management
View article
Efficient Memory Management for Large Language Model Serving with PagedAttention Open
High throughput serving of large language models (LLMs) requires batching sufficiently many requests at a time. However, existing systems struggle because the key-value cache (KV cache) memory for each request is huge and grows and shrinks…
View article
DRISA Open
Data movement between the processing units and the memory in traditional von Neumann architecture is creating the "memory wall" problem. To bridge the gap, two approaches, the memory-rich processor (more on-chip memory) and the compute-cap…
View article
Tutorial: Brain-inspired computing using phase-change memory devices Open
There is a significant need to build efficient non-von Neumann computing systems for highly data-centric artificial intelligence related applications. Brain-inspired computing is one such approach that shows significant promise. Memory is …
View article
Processing data where it makes sense: Enabling in-memory computation Open
Today's systems are overwhelmingly designed to move data to computation. This design choice goes directly against at least three key trends in systems that cause performance, scalability and energy bottlenecks: (1) data access from memory …
View article
Memory materials and devices: From concept to application Open
Memory cells have always been an important element of information technology. With emerging technologies like big data and cloud computing, the scale and complexity of data storage has reached an unprecedented peak with a much higher requi…
View article
Energy efficiency across programming languages: how do energy, time, and memory relate? Open
This paper presents a study of the runtime, memory usage and energy consumption of twenty seven well-known software languages. We monitor the performance of such languages using ten different programming problems, expressed in each of the …
View article
Basic Performance Measurements of the Intel Optane DC Persistent Memory Module Open
Scalable nonvolatile memory DIMMs will finally be commercially available with the release of the Intel Optane DC Persistent Memory Module (or just "Optane DC PMM"). This new nonvolatile DIMM supports byte-granularity accesses with access t…
View article
A Survey on Resource Management in IoT Operating Systems Open
Recently, the Internet of Things (IoT) concept has attracted a lot of attention due to its capability to translate our physical world into a digital cyber world with meaningful information. The IoT devices are smaller in size, sheer in num…
View article
Telling your secrets without page faults: stealthy page table-based attacks on enclaved execution Open
Protected module architectures, such as Intel SGX, enable strong trusted computing guarantees for hardware-enforced enclaves on top a potentially malicious operating system. However, such enclaved execution environments are known to be vul…
View article
Efficient Dialogue State Tracking by Selectively Overwriting Memory Open
Recent works in dialogue state tracking (DST) focus on an open vocabulary-based setting to resolve scalability and generalization issues of the predefined ontology-based approaches. However, they are inefficient in that they predict the di…
View article
Device and Circuit Architectures for In‐Memory Computing Open
With the rise in artificial intelligence (AI), computing systems are facing new challenges related to the large amount of data and the increasing burden of communication between the memory and the processing unit. In‐memory computing (IMC)…
View article
Breaking Kernel Address Space Layout Randomization with Intel TSX Open
Kernel hardening has been an important topic since many applications and security mechanisms often consider the kernel as part of their Trusted Computing Base (TCB). Among various hardening techniques, Kernel Address Space Layout Randomiza…
View article
ComputeDRAM Open
In-memory computing has long been promised as a solution to the "Memory Wall" problem. Recent work has proposed using chargesharing on the bit-lines of a memory in order to compute in-place and with massive parallelism, all without having …
View article
Brief Announcement: On Implementing Wear Leveling in Persistent Synchronization Structures Open
The last decade has witnessed an explosion of research on persistent memory, which combines the low access latency of dynamic random access memory (DRAM) with the durability of secondary storage. Intel’s implementation of persistent memory…
View article
Can far memory improve job throughput? Open
As memory requirements grow, and advances in memory technology slow, the availability of sufficient main memory is increasingly the bottleneck in large compute clusters. One solution to this is memory disaggregation, where jobs can remotel…
View article
Computational phase-change memory: beyond von Neumann computing Open
The explosive growth in data-centric artificial intelligence related applications necessitates a radical departure from traditional von Neumann computing systems, which involve separate processing and memory units. Computational memory is …
View article
Nimble Page Management for Tiered Memory Systems Open
Software-controlled heterogeneous memory systems have the potential to increase the performance and cost efficiency of computing systems. However they can only deliver on this promise if supported by efficient page management policies and …
View article
Multiprogramming a 64kB Computer Safely and Efficiently Open
Low-power microcontrollers lack some of the hardware features and memory resources that enable multiprogrammable systems. Accordingly, microcontroller-based operating systems have not provided important features like fault isolation, dynam…
View article
VAULT Open
Intel's SGX offers state-of-the-art security features, including confidentiality, integrity, and authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are placed in an Enclave Page Cache (EPC) within the physical m…
View article
IMAC: In-Memory Multi-Bit Multiplication and ACcumulation in 6T SRAM Array Open
`In-memory computing' is being widely explored as a novel computing paradigm\nto mitigate the well known memory bottleneck. This emerging paradigm aims at\nembedding some aspects of computations inside the memory array, thereby\navoiding f…
View article
Protecting Bare-Metal Embedded Systems with Privilege Overlays Open
Embedded systems are ubiquitous in every aspect of modern life. As the Internet of Thing expands, our dependence on these systems increases. Many of these interconnected systems are and will be low cost bare-metal systems, executing withou…
View article
MemLock Open
Uncontrolled memory consumption is a kind of critical software security weaknesses. It can also become a security-critical vulnerability when attackers can take control of the input to consume a large amount of memory and launch a Denial-o…
View article
A Tale of Two Worlds Open
sponsorship: This research is partially funded by the Research Fund KU Leuven, and by the Agency for Innovation and Entrepreneurship (Flanders). Jo Van Bulck is supported by a grant of the Research Foundation - Flanders (FWO). This researc…
View article
Makalu: fast recoverable allocation of non-volatile memory Open
Byte addressable non-volatile memory (NVRAM) is likely to supplement, and perhaps eventually replace, DRAM. Applications can then persist data structures directly in memory instead of serializing them and storing them onto a durable block …
View article
Rethinking software runtimes for disaggregated memory Open
Disaggregated memory can address resource provisioning inefficiencies in current datacenters. Multiple software runtimes for disaggregated memory have been proposed in an attempt to make disaggregated memory practical. These systems rely o…
View article
SIMPLER MAGIC: Synthesis and Mapping of In-Memory Logic Executed in a Single Row to Improve Throughput Open
In-memory processing can dramatically improve the latency and energy consumption of computing systems by minimizing the data transfer between the memory and the processor. Efficient execution of processing operations within the memory is t…
View article
How to Build a Non-Volatile Memory Database Management System Open
The difference in the performance characteristics of volatile (DRAM) and non-volatile storage devices (HDD/SSDs) influences the design of database management systems (DBMSs). The key assumption has always been that the latter is much slowe…
View article
Clio: a hardware-software co-designed disaggregated memory system Open
Memory disaggregation has attracted great attention recently because of its benefits in efficient memory utilization and ease of management. So far, memory disaggregation research has all taken one of two approaches: building/emulating mem…
View article
A comparison study of intel SGX and AMD memory encryption technology Open
Hardware-assisted trusted execution environments are secure isolation technologies that have been engineered to serve as efficient defense mechanisms to provide a security boundary at the system level. Hardware vendors have introduced a va…
View article
The Mondrian Data Engine Open
The increasing demand for extracting value out of ever-growing data poses an ongoing challenge to system designers, a task only made trickier by the end of Dennard scaling. As the performance density of traditional CPU-centric architecture…