The architectural implications of facebook's dnn-based personalized recommendation

U Gupta, CJ Wu, X Wang, M Naumov… - … Symposium on High …, 2020 - ieeexplore.ieee.org
The widespread application of deep learning has changed the landscape of computation in
data centers. In particular, personalized recommendation for content ranking is now largely …

DAWG: A defense against cache timing attacks in speculative execution processors

V Kiriansky, I Lebedev, S Amarasinghe… - 2018 51st Annual …, 2018 - ieeexplore.ieee.org
Software side channel attacks have become a serious concern with the recent rash of
attacks on speculative processor architectures. Most attacks that have been demonstrated …

Deeprecsys: A system for optimizing end-to-end at-scale neural recommendation inference

U Gupta, S Hsia, V Saraph, X Wang… - 2020 ACM/IEEE 47th …, 2020 - ieeexplore.ieee.org
Neural personalized recommendation is the cornerstone of a wide collection of cloud
services and products, constituting significant compute demand of cloud infrastructure. Thus …

{HybCache}: Hybrid {Side-Channel-Resilient} caches for trusted execution environments

G Dessouky, T Frassetto, AR Sadeghi - 29th USENIX Security …, 2020 - usenix.org
Modern multi-core processors share cache resources for maximum cache utilization and
performance gains. However, this leaves the cache vulnerable to side-channel attacks …

Why on-chip cache coherence is here to stay

MMK Martin, MD Hill, DJ Sorin - Communications of the ACM, 2012 - dl.acm.org
Why on-chip cache coherence is here to stay Page 1 78 CommuniCations oF the aCm | juLy 2012
| voL. 55 | no. 7 contributed articles shAred MeMorY is the dominant low-level communication …

Secure hierarchy-aware cache replacement policy (sharp) defending against cache-based side channel atacks

M Yan, B Gopireddy, T Shull, J Torrellas - ACM SIGARCH Computer …, 2017 - dl.acm.org
In cache-based side channel attacks, a spy that shares a cache with a victim probes cache
locations to extract information on the victim's access patterns. For example, in evict+ reload …

Transient-Execution Attacks: A Computer Architect Perspective

L Fiolhais, L Sousa - ACM Computing Surveys, 2023 - dl.acm.org
Computer architects employ a series of performance optimizations at the micro-architecture
level. These optimizations are meant to be invisible to the programmer but they are implicitly …

Microarchitectural attacks in heterogeneous systems: A survey

H Naghibijouybari, EM Koruyeh… - ACM Computing …, 2022 - dl.acm.org
With the increasing proliferation of hardware accelerators and the predicted continued
increase in the heterogeneity of future computing systems, it is necessary to understand the …

Improving cache management policies using dynamic reuse distances

N Duong, D Zhao, T Kim, R Cammarota… - 2012 45Th annual …, 2012 - ieeexplore.ieee.org
Cache management policies such as replacement, bypass, or shared cache partitioning
have been relying on data reuse behavior to predict the future. This paper proposes a new …

PACMan: prefetch-aware cache management for high performance caching

CJ Wu, A Jaleel, M Martonosi, SC Steely Jr… - Proceedings of the 44th …, 2011 - dl.acm.org
Hardware prefetching and last-level cache (LLC) management are two independent
mechanisms to mitigate the growing latency to memory. However, the interaction between …