Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/8868
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bostanci, F. Nisa | - |
dc.contributor.author | Olgun, Ataberk | - |
dc.contributor.author | Orosa, Lois | - |
dc.contributor.author | Yaglikci, A. Giray | - |
dc.contributor.author | Kim, Jeremie S. | - |
dc.contributor.author | Hassan, Hasan | - |
dc.contributor.author | Mutlu, Onur | - |
dc.contributor.author | Ergin, Oğuz | - |
dc.date.accessioned | 2022-11-30T19:22:10Z | - |
dc.date.available | 2022-11-30T19:22:10Z | - |
dc.date.issued | 2022 | - |
dc.identifier.isbn | 978-1-6654-2027-3 | - |
dc.identifier.issn | 1530-0897 | - |
dc.identifier.uri | https://doi.org/10.1109/HPCA53966.2022.00087 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/8868 | - |
dc.description | 28th Annual IEEE International Symposium on High-Performance Computer Architecture (HPCA) -- APR 02-06, 2022 -- ELECTR NETWORK | en_US |
dc.description.abstract | Random number generation is an important task in a wide variety of critical applications including cryptographic algorithms, scientific simulations, and industrial testing tools. True Random Number Generators (TRNGs) produce cryptographically secure truly random data by sampling a physical entropy source that typically requires custom hardware and suffers from long latency. To enable high-bandwidth and low-latency TRNGs on widely-available commodity devices, recent works propose hardware TRNGs that generate random numbers using commodity DRAM as an entropy source. Although prior works demonstrate promising TRNG mechanisms using DRAM, practical integration of such mechanisms into real systems poses various challenges. We identify three key challenges for using DRAM-based TRNGs in current systems: (1) generating random numbers with DRAM-based TRNGs can degrade overall system performance by slowing down concurrently-running applications due to the interference between RNG and regular memory operations in the memory controller (i.e., RNG interference), (2) this RNG interference can degrade system fairness by causing unfair prioritization of applications that intensively use random numbers (i.e., RNG applications), and (3) RNG applications can experience significant slowdown due to the high latency of DRAM-based TRNGs. To address these challenges, we propose DR-STRaNGe, an end-to-end system design for DRAM-based TRNGs that (1) reduces the RNG interference by separating RNG requests from regular memory requests in the memory controller, (2) improves fairness across applications with an RNG-aware memory request scheduler, and (3) hides the large TRNG latencies using a random number buffering mechanism combined with a new DRAM idleness predictor that accurately identifies idle DRAM periods. We evaluate DR-STRaNGe using a comprehensive set of 186 multi programmed workloads. Compared to an RNG-oblivious baseline system, DR-STRaNGe improves the performance of non-RNG and RNG applications on average by 17.9% and 25.1%, respectively. DR-STRaNGe improves system fairness by 32.1% on average when generating random numbers at a 5 Gb/s throughput. DR-STRaNGe reduces energy consumption by 21% compared to the RNG-oblivious baseline design by reducing the time spent for RNG and non-RNG memory accesses by 15.8%. | en_US |
dc.description.sponsorship | IEEE,IEEE Comp Soc,Samsung,Microsoft,Sk Hynix,Furiosa,AMD,Intel,Arm,Meta,IBM,Nvidia,Kaist | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE Computer Soc | en_US |
dc.relation.ispartof | 2022 Ieee International Symposium On High-Performance Computer Architecture (Hpca 2022) | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Latency Dram | en_US |
dc.subject | Flash Memory | en_US |
dc.subject | Rethinking | en_US |
dc.subject | Bandwidth | en_US |
dc.subject | Fair | en_US |
dc.title | Dr-Strange: End-To System Design for Dram-Based True Random Number Generators | en_US |
dc.type | Conference Object | en_US |
dc.identifier.startpage | 1141 | en_US |
dc.identifier.endpage | 1155 | en_US |
dc.identifier.wos | WOS:000838704300079 | en_US |
dc.identifier.scopus | 2-s2.0-85129515115 | en_US |
dc.institutionauthor | Ergin, Oğuz | - |
dc.identifier.doi | 10.1109/HPCA53966.2022.00087 | - |
dc.authorscopusid | 57224503682 | - |
dc.authorscopusid | 57222238840 | - |
dc.authorscopusid | 55062282700 | - |
dc.authorscopusid | 56349176000 | - |
dc.authorscopusid | 56311059300 | - |
dc.authorscopusid | 57189066886 | - |
dc.authorscopusid | 6603141208 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | - | - |
dc.ozel | 2022v3_Edit | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
4
checked on Dec 21, 2024
WEB OF SCIENCETM
Citations
6
checked on Dec 21, 2024
Page view(s)
116
checked on Dec 23, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.