International Business Machines Corporation
Microarchitectural techniques to mitigate cache-based data security vulnerabilities

Last updated:

Abstract:

Embodiments for mitigating cache-based data security vulnerabilities in a computing environment are provided. Cache pollution due to speculative memory accesses within a speculative path is avoided by delaying data updates to a cache and memory subsystem until the speculative memory accesses are resolved. A speculative buffer is used to maintain the speculative memory accesses such that a state of the cache remains unchanged until the speculative memory accesses are committed.

Status:
Grant
Type:

Utility

Filling date:

1 Aug 2018

Issue date:

20 Jul 2021