Special Issue: Computer Architecture and Systems

• Articles • Previous Articles     Next Articles

DYNAMEM-A Microarchitecture for Improving Memory Disambiguation at Run-Time

Wang Xianzhu; Liao Heng; Li Sanli;   

  1. Department of Computer Science & Technology; Tsinghua University; Beijing 100084;
  • Online:1996-11-10 Published:1996-11-10

This paper presents a new microarchitecture technique named DYNAMEM,in which memory reference instructions are dynamically scheduled and can be executed out-of-order. Load instructions can bypass store instructions specula-tively, even if the store instructions'addresses are unknown. DYNAMEM can greatly alleviate the restraints of ambiguous memory dependencies. Simulation results show that the frequency of false load is low. Mechanism has been pro-vided to repair false loads with low penalty, and to achieve…

Key words: oblivious polynomial evaluation; oblivious transfer; secure multi-party computation; information security;



[1] Theobald.K et al. On the limits of program parallelism and its smoothability. In Proc. of 25th Annual Symposium on Microarchitecture, Dec. 1992.

[2] Wall.D. Limits of instruction-level parallelism. In Proc. of, 4th International Conference on Architectural Support for Programming Languages and Operating Systems, pp.176-188, Apr.1991.

[3] Johnson.M. Superscalar Microprocessor Design. Pretice-Hall, 1991 ……….
[1] Louis Cianciullo and Hossein Ghodosi. Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results [J]. Journal of Computer Science and Technology, 2022, 37(2): 443-458.
[2] Maryam Zarezadeh, Hamid Mala, Homa Khajeh. Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation [J]. Journal of Computer Science and Technology, 2020, 35(4): 863-874.
[3] Chong Wang, Nasro Min-Allah, Bei Guan, Yu-Qi Lin, Jing-Zheng Wu, Yong-Ji Wang. An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion [J]. Journal of Computer Science and Technology, 2019, 34(6): 1351-1365.
[4] Bo Yang, Yong Yu, and Chung-Huang Yang. A Secure Scalar Product Protocol Against Malicious Adversaries [J]. , 2013, 28(1): 152-158.
[5] Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency [J]. , 2008, 23(2): 253-264 .
[6] Bo Qin, Qian-Hong Wu, Willy Susilo, Yi Mu, Yu-Min Wang, and Zheng-Tao Jiang. Short Group Signatures Without Random Oracles [J]. , 2007, 22(6): 805-821 .
[7] Xin-Yi Huang, Willy Susilo, Yi Mu, and Fu-Tai Zhang. Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt 2004 [J]. , 2007, 22(1): 71-74 .
[8] Yong-Long Luo, Liu-Sheng Huang, and Hong Zhong. Secure Two-Party Point-Circle Inclusion Problem [J]. , 2007, 22(1): 88-91 .
[9] Jie Tian, Liang Li, and Xin Yang. Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment [J]. , 2006, 21(5): 861-870 .
[10] Deng-Guo Feng and Xiao-Yun Wang. Progress and Prospect of Some Fundamental Research on Information Security in China [J]. , 2006, 21(5): 740-755 .
[11] Shun-Dong Li and Yi-Qi Dai. Secure Two-Party Computational Geometry [J]. , 2005, 20(2): 0-0.
[12] Hong-Da Li, Xiong Yang, Deng-Guo Feng, and Bao Li. Distributed Oblivious Function Evaluation and Its Applications [J]. , 2004, 19(6): 0-0.
[13] Hong-Da Li, Dong-Yao Ji, Deng-Guo Feng, and Bao Li. Oblivious Polynomial Evaluation [J]. , 2004, 19(4): 0-0.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Xu Jie; Li Qingnan; Huang Shize; Xu Jiangfeng;. DFTSNA:A Distributed Fault-Tolerant Shipboard System[J]. , 1990, 5(2): 109 -116 .
[2] Lin Zuoquan; Shi Chunyi;. A Generalization of Circumscription[J]. , 1992, 7(2): 97 -104 .
[3] Ma Jun; Ma Shaohan;. An O(k~2n~2) Algorithm to Find a k-Partition in a k-Connected Graph[J]. , 1994, 9(1): 86 -91 .
[4] Gao Wen; Chen Xilin;. A Stochastic Approach for Blurred Image Restoration and Optical Flow Computation on Field Image Sequence[J]. , 1997, 12(5): 385 -399 .
[5] Fu Yuxi;. Symmetric π-Calculus[J]. , 1998, 13(3): 202 -208 .
[6] GAO Shuming; WAN Huagen; PENG Qunsheng;. Constraint-Based Virtual Solid Modeling[J]. , 2000, 15(1): 56 -63 .
[7] LIU Xicheng; LI Timothy J;. Implementation of a Prototype VoIP System[J]. , 2000, 15(5): 480 -484 .
[8] Wei Lu, Xiu-Tao Yang, Tao Lv, and Xiao-Wei Li. An Efficient Evaluation and Vector Generation Method for Observability-Enhanced Statement Coverage[J]. , 2005, 20(6): 875 -884 .
[9] Su-Qing Han and Jue Wang. Second Attribute Algorithm Based on Tree Expression[J]. , 2006, 21(3): 383 -392 .
[10] Xin-Fu Wang and De-Bin Zhao. Performance Comparison of AVS and H.264/AVC Video Coding Standards[J]. , 2006, 21(3): 310 -314 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved