Dealing with (some of) the fallout from meltdown

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The meltdown vulnerability allows users to read kernel memory by exploiting a hardware flaw in speculative execution. Processor vendors recommend "page table isolation"(PTI) as a software fix, but PTI can significantly degrade the performance of system-call-heavy programs. Leveraging the fact that 32-bit pointers cannot access 64-bit kernel memory, we propose "Shrink", a safe alternative to PTI, which is applicable to programs capable of running in 32-bit address spaces. We show that Shrink can restore the performance of some workloads, suggest additional potential alternatives, and argue that vendors must be more open about hardware flaws to allow developers to design protection schemes that are safe and performant.

Cite

CITATION STYLE

APA

Amit, N., Wei, M., & Tsafrir, D. (2021). Dealing with (some of) the fallout from meltdown. In SYSTOR 2021 - Proceedings of the 14th ACM International Conference on Systems and Storage. Association for Computing Machinery, Inc. https://doi.org/10.1145/3456727.3463776

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free