A cache protection method and device based on dynamic mapping mechanism

A technology of dynamic mapping and protective devices, applied in the field of information security, can solve problems such as processor performance loss, achieve the effect of reducing performance loss and improving security

Active Publication Date: 2022-07-15
CHINA AGRI UNIV
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the problem of processor performance loss caused by the above-mentioned existing cache protection method or at least partially solve the above-mentioned problem, an embodiment of the present invention provides a cache protection method and device based on a dynamic mapping mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cache protection method and device based on dynamic mapping mechanism
  • A cache protection method and device based on dynamic mapping mechanism
  • A cache protection method and device based on dynamic mapping mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0047] In an embodiment of the present invention, a cache protection method based on a dynamic mapping mechanism is provided, figure 1 A schematic diagram of an overall flow of a cache protection method based on a dynamic mapping mechanism provided by an embodiment of the present invention, the method includes: S101, when a processor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a cache protection method and device based on a dynamic mapping mechanism. The method includes: when a processor sends an instruction to request a read operation to the cache, caching the address and address table of data requested by the processor in the cache data Compare the cache addresses of the requested data to determine whether the address of the requested data hits an entry in the address table; if it hits, query the valid bit table corresponding to the entry to determine whether the entry is in a valid state, if so, from the Get the data row address corresponding to the requested data in the association table, and fetch the requested data from the data table; if the miss or hit table entry is invalid, the cache will send a missing signal, forcing the processor to get the request from the main memory The data corresponding to the read operation. The embodiment of the present invention balances the cache access time, avoids timing information from being used, and improves the security of the processor.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a cache protection method and device based on a dynamic mapping mechanism. Background technique [0002] Speculative execution of instructions improves processor performance and is widely used in modern processors. However, current research shows that through speculative execution, the processor exposes kernel data, resulting in data leakage. [0003] Spectre and Meltdown attacks pose serious security threats to processors. In a common Spectre attack case, it accesses the kernel space through malicious instructions, and then uses the data in the kernel space as an address reference to load the memory data at the corresponding address. In this process, since the load class instruction loads the memory data with the kernel data as the address, the cache will be replaced, and the cache line of the corresponding address will be loaded into the cache. Altho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/14G06F21/79
CPCG06F12/1408G06F21/79
Inventor 高万林吴德华周维新曹咏翔杨扬赵龙陶莎
Owner CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products