Cache protection method and device based on dynamic mapping mechanism

A technology of dynamic mapping and protective devices, which is applied in the field of information security and can solve problems such as processor performance loss

Active Publication Date: 2020-07-14
CHINA AGRI UNIV
View PDF14 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the problem of processor performance loss caused by the above-mentioned existing cache protection method or at least partially solve the above-mentioned problem, an embodiment of the present invention provides a cache protection method and device based on a dynamic mapping mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cache protection method and device based on dynamic mapping mechanism
  • Cache protection method and device based on dynamic mapping mechanism
  • Cache protection method and device based on dynamic mapping mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] In one embodiment of the present invention, a cache protection method based on a dynamic mapping mechanism is provided, figure 1 The overall flow diagram of the cache protection method based on the dynamic mapping mechanism provided by the embodiment of the present invention, the method includes: S101, when the processor sends an instruction...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a cache protection method and device based on a dynamic mapping mechanism. The method comprises: when a processor sends an instruction for requesting reading operation to a cache, comparing an address of request data of the processor with a cache address of data cached in the cache in an address table, and determining whether the address of the request datahits a certain table item in the address table or not; if the table entry is hit, inquiring a valid bit table corresponding to the table entry, determining whether the table entry is in a valid stateor not, if so, obtaining a data row address corresponding to the request data from the association table, and taking out the request data from the data table; and if the missed or hit table entry isin an invalid state, the cache sends a missing signal to force the processor to acquire data corresponding to the read request operation from the main memory. According to the embodiment of the invention, the cache access time is balanced, time sequence information is prevented from being utilized, and the security of the processor is improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a cache protection method and device based on a dynamic mapping mechanism. Background technique [0002] Speculative execution of instructions improves processor performance and is widely used in modern processors. However, current research shows that through speculative execution, processors can expose kernel data, resulting in data leakage. [0003] Specter and Meltdown attacks pose serious threats to processor security. In a common Specter attack case, it accesses the kernel space through malicious instructions, and then uses the data in the kernel space as an address reference to load the memory data at the corresponding address. In this process, since the load instruction loads the memory data with the kernel data as the address, the cache will be replaced, and the cache line of the corresponding address will be loaded into the cache. Although the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/79
CPCG06F12/1408G06F21/79
Inventor 高万林吴德华周维新曹咏翔杨扬赵龙陶莎
Owner CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products