International Business Machines Corporation
Microarchitectural techniques to mitigate cache-based data security vulnerabilities
Last updated:
Abstract:
Embodiments for mitigating cache-based data security vulnerabilities in a computing environment are provided. Cache pollution due to speculative memory accesses within a speculative path is avoided by delaying data updates to a cache and memory subsystem until the speculative memory accesses are resolved. A speculative buffer is used to maintain the speculative memory accesses such that a state of the cache remains unchanged until the speculative memory accesses are committed.
Status:
Grant
Type:
Utility
Filling date:
1 Aug 2018
Issue date:
20 Jul 2021