Abstract
Prior work shows that Rowhammer attacks-which flip bits in DRAM via frequent activations of the same row(s)-are viable. Adversaries typically mount these attacks via instruction sequences that are carefully-crafted to bypass CPU caches. However, we discover a novel form of hammering that we refer to as coherenceinduced hammering, caused by Intel's implementations of cache coherent non-uniform memory access (ccNUMA) protocols. We show that this hammering occurs in commodity benchmarks on a major cloud provider's production hardware, the frst hammering found to be generated by non-malicious code. Given DRAM's rising susceptibility to bit flips, it is paramount to prevent coherenceinduced hammering to ensure reliability and security in the cloud. Accordingly, we introduce MOESI-prime, a ccNUMA coherence protocol that mitigates coherence-induced hammering while retaining Intel's state-of-the-art scalability. MOESI-prime shows that most DRAM reads and writes triggering such hammering are unnecessary. Thus, by encoding additional information in the coherence protocol, MOESI-prime can omit these reads and writes, preventing coherence-induced hammering in non-malicious and malicious workloads. Furthermore, by omitting unnecessary reads and writes, MOESI-prime has negligible effect on average performance (within ±0.61% of MESI and MOESI) and average DRAM power (0.03%-0.22% improvement) across evaluated ccNUMA confgurations.
Author supplied keywords
Cite
CITATION STYLE
Loughlin, K., Saroiu, S., Wolman, A., Manerkar, Y. A., & Kasikci, B. (2022). MOESI-prime: Preventing Coherence-Induced Hammering in Commodity Workloads. In Proceedings - International Symposium on Computer Architecture (pp. 670–684). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1145/3470496.3527427
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.