Dynamic Prediction of Dynamic Prediction of Architectural Architectural Vulnerability from Vulnerability from Microarchitectural State Microarchitectural State Kristen R. Walcott Kristen R. Walcott Masters Presentation Masters Presentation May 2, 2007 May 2, 2007 To be presented at ISCA, June 2007
31
Embed
Dynamic Prediction of Architectural Vulnerability from Microarchitectural State
Dynamic Prediction of Architectural Vulnerability from Microarchitectural State. Kristen R. Walcott Masters Presentation May 2, 2007. To be presented at ISCA, June 2007. n+. n channel. + -. + -. + -. +-. + -. + -. + -. + -. + -. Energetic Particles Attack!. Neutron. G. D. S. - PowerPoint PPT Presentation
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Dynamic Prediction of Dynamic Prediction of Architectural Vulnerability Architectural Vulnerability
from from Microarchitectural StateMicroarchitectural State
The probability that a fault in a structure will result in an architecturally visible incorrect execution
Fraction of time that a bit is in a state of Architecturally Correct Execution (ACE)
AVF = (Bace) (Lace) =#B
Bace
Lace
http://www.cs.virginia.edu/~krw7c/avf.html
Past Redundancy Past Redundancy TechniquesTechniques
Hardware replication Hardware replication ((Bernick et al. 2005, Slegal et al. 1999Bernick et al. 2005, Slegal et al. 1999))
Redundant Multithreading (RMT) Redundant Multithreading (RMT) – ((Mukherjee et al. 2002, Reinhardt and Mukherjee 2000, Reis et al. Mukherjee et al. 2002, Reinhardt and Mukherjee 2000, Reis et al.
20052005))– Less hardware necessaryLess hardware necessary– Better performance by dynamically partitioning Better performance by dynamically partitioning
resourcesresources Partial RMTPartial RMT
– Reduce power consumptionReduce power consumption– Increase performanceIncrease performance
http://www.cs.virginia.edu/~krw7c/avf.html
Partial RMT Partial RMT TechniquesTechniques
Performance-Efficient RMTPerformance-Efficient RMT– Exploiting instruction reuse (Exploiting instruction reuse (Parashar et al.,Parashar et al., ISCA 2004))– Opportunistic DIE-IRB Opportunistic DIE-IRB ((Gomaa et al., ISCA 2005Gomaa et al., ISCA 2005))– Using speculation as a form of redundancy Using speculation as a form of redundancy
((Parashar et al., ASPLOS 2006))– Relaxing input replication (Relaxing input replication (Smolens et al., MICRO 2006Smolens et al., MICRO 2006))
Power-Efficient RMTPower-Efficient RMT– ((Madan and Balasubramonian SELSE 2006, Madan and Balasubramonian SELSE 2006,
Rashid et al. ISCA 2005Rashid et al. ISCA 2005))
Problem:Problem: RMT schemes are oblivious to RMT schemes are oblivious to the actual vulnerabilitythe actual vulnerability
http://www.cs.virginia.edu/~krw7c/avf.html
Experiment DesignExperiment Design
SimpleScalar 3.0SimpleScalar 3.0 Modified to track AVFModified to track AVF
(RUU)(RUU) Modified to perform RMTModified to perform RMT
– Based on Simultaneous and Redundantly Threaded (SRT) design
http://www.cs.virginia.edu/~krw7c/avf.html
Experiment DesignExperiment Design
26 SPEC2000 benchmarks26 SPEC2000 benchmarks
Each benchmark is run for multiple 100-million instruction SimPoints
Checkpoint the entire microarchitectural state (160 variables) and calculate AVF every 4 million instructions(25 “snapshots” per SimPoint)
http://www.cs.virginia.edu/~krw7c/avf.html
Experimental ResultsExperimental Resultsperlbmk bzip2 art
2 SimPoints measuring RUU AVF
AVF can vary significantly over time and across applications
http://www.cs.virginia.edu/~krw7c/avf.html
A single metric is likely not enough.
More sophisticated prediction mechanism needed!
Experimental ResultsExperimental Resultsperlbmk bzip2 art
RU
U
AV
FIP
C
http://www.cs.virginia.edu/~krw7c/avf.html
Detecting CorrelationsDetecting Correlations
Visual trendsVisual trends– Too many metrics to considerToo many metrics to consider– Correlation may not hold in all casesCorrelation may not hold in all cases
Principal Component AnalysisPrincipal Component Analysis Regression techniquesRegression techniques
– Linear regressionLinear regression– Quadratic regressionQuadratic regression
http://www.cs.virginia.edu/~krw7c/avf.html
Principal Component Principal Component AnalysisAnalysis
Optimal linear transformation for projecting data into a new coordinate system
Identified 69 principal components
Four components had substantially higher singular values
R2 values:– 0.61 RUU – 0.47 ISQ – 0.55 LSQ
Good results, but spanning eigenvectors
are linear combinations of the
original 160 performance variables
http://www.cs.virginia.edu/~krw7c/avf.html
Searching for Searching for CorrelationsCorrelations
Identify strong correlations between structural AVF values and a small
set of easily measurable processor metrics.
http://www.cs.virginia.edu/~krw7c/avf.html
Practical AVF Practical AVF PredictionPrediction
Regression techniques– Gives a function to predict the value of
a dependent variable Problem: Find the optimal representation of
as a weighted combination of basis functions , where each depends only on the values of a subset of the predictor variables (minimize the sum of squared errors )
yi = ¯0 + ¯1f 1i + ¯2f 2i +:::+ ¯kf ki + ²i
f1;f 2; : : :f k
ypredictor variablesresponse variable (AVF)
¯ i¯ i
y
Pi ²2
i
http://www.cs.virginia.edu/~krw7c/avf.html
Linear RegressionLinear Regression Include the single variable with the highest correlation Consider all remaining 159 variables in turn Select the best and repeat, until all variables used. Select subset for predictor
Quadratic RegressionQuadratic Regression For each pair we perform a nonlinear least-
Resulting PredictorsResulting Predictors P1: Multi-variable linear predictorP1: Multi-variable linear predictor P2: Quadratic predictorP2: Quadratic predictor P3: Linear predictor whose terms are those P3: Linear predictor whose terms are those
variables with the highest individual correlation variables with the highest individual correlation to AVFto AVF
PredictPredictoror
StrucStructt
EquationEquation
P1P1 RUURUU
ISQISQ
LSQLSQ SCRcLoLc
R2
Ro
Rl Ro SB WIPC
IPB
IPB
0.93
0.74
0.94
LLccLSQ countLSQ count
LLooAvg LSQ occupancyAvg LSQ occupancy
RRccRUU countRUU count
SCSC Total # of slip cycles Total # of slip cycles (issue to retirement)(issue to retirement)
RRooRUU occupancyRUU occupancy
IPBIPB Instructions per branchInstructions per branch
RRllRUU latencyRUU latency
IPCIPC Instructions per cycleInstructions per cycle
No one predictor No one predictor constantly does bestconstantly does best
P1 (multivariable P1 (multivariable linear predictor) gives linear predictor) gives good compromise good compromise – Cost of implementationCost of implementation– AccuracyAccuracy
http://www.cs.virginia.edu/~krw7c/avf.html
More Related WorkMore Related Work
Fu, X., Poe, J., Li, T., and Fortes, J. A. 2006. Characterizing Fu, X., Poe, J., Li, T., and Fortes, J. A. 2006. Characterizing Microarchitecture Soft Error Vulnerability Phase Behavior. In Microarchitecture Soft Error Vulnerability Phase Behavior. In Proceedings of the 14th IEEE international Symposium on Proceedings of the 14th IEEE international Symposium on Modeling, Analysis, and SimulationModeling, Analysis, and Simulation (September 11 - 14, 2006). (September 11 - 14, 2006). MASCOTS. IEEE Computer Society, Washington, DC, 147-155.MASCOTS. IEEE Computer Society, Washington, DC, 147-155.
Show that AVF varies for microarchitecture structures Show that AVF varies for microarchitecture structures over time over time and across applicationsand across applications Attempt to find correlation with 5 individual metricsAttempt to find correlation with 5 individual metrics
– Goal to link vulnerability with phase behaviorGoal to link vulnerability with phase behavior– Consider each metric by itselfConsider each metric by itself
Metrics were few in number and exhibited inconsistent Metrics were few in number and exhibited inconsistent correlation to AVF -> Gave up the idea of a predictive correlation to AVF -> Gave up the idea of a predictive approachapproach