skip to main content
10.1145/2463209.2488800acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Improving the energy efficiency of hardware-assisted watchpoint systems

Published: 29 May 2013 Publication History

Abstract

Hardware-assisted watchpoint systems enhance the execution of numerous dynamic software techniques, such as memory protection, module isolation, deterministic execution, and data race detection. In this paper, we show that previous hardware proposals may introduce significant energy overheads, and propose WatchPoint Filtering (WPF), a novel filtering mechanism that eliminates unnecessary watchpoint checks. We evaluate WPF on two state-of-the-art proposals for hardware-assisted watchpoints using two common memory checkers. WPF eliminates 83% of the watchpoint checks (up to 99.7%) and reduces 57% of the dynamic energy overhead (up to 78%) on average, without introducing additional performance execution overhead.

References

[1]
D. Bruening. Efficient, transparent, and comprehensive runtime code manipulation. PhD thesis, MIT, 2004.
[2]
K. Chen et al. Improving enterprise database performance on intel itanium architecture. In Ottawa Linux Symposium, 2003.
[3]
S. Chen, M. Kozuch, T. Strigkos, B. Falsafi, et al. Flexible hardware acceleration for instruction-grain program monitoring. ISCA, 2008.
[4]
J. L. Greathouse, H. Xin, Y. Luo, and T. Austin. A case for unlimited watchpoints. ASPLOS, 2012.
[5]
S. Hangal and M. Lam. Tracking down software bugs using automatic anomaly detection. ICSE, 2002.
[6]
R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. USENIX, 1991.
[7]
J. Henning. Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News, 34:1--17, Sept. 2006.
[8]
C. Luk, R. Cohn, R. Muth, H. Patil, et al. Pin: building customized program analysis tools with dynamic instrumentation. PLDI, 2005.
[9]
N. Muralimanohar et al. Architecting efficient interconnects for large caches with cacti 6.0. IEEE Micro, 28:69--79, January 2008.
[10]
J. Navarro et al. Practical, transparent operating system support for superpages. OSDI, 2002.
[11]
N. Neelakantam and C. Zilles. Ufo: A general-purpose user-mode memory protection technique for application use. Technical report, UIUC, 2007.
[12]
N. Nethercote et al. Valgrind: a framework for heavyweight dynamic binary instrumentation. PLDI, 2007.
[13]
B. Romanescu, A. Lebeck, D. Sorin, and A. Bracy. Unified instruction/translation/data (unitd) coherence: One protocol to rule them all. HPCA, 2010.
[14]
R. Shetty et al. Heapmon: A helper-thread approach to programmable, automatic, and low-overhead memory bug detection. Ibm Journal of Research and Development, 50:261--276, 2006.
[15]
A. Shriraman and S. Dwarkadas. Sentry: light-weight auxiliary memory access control. ISCA, 2010.
[16]
J. Tuck, W. Ahn, L. Ceze, and J. Torrellas. Softsig: software-exposed hardware signatures for code analysis and optimization. ASPLOS, 2008.
[17]
G. Venkataramani et al. Memtracker: Efficient and programmable support for memory access monitoring and debugging. HPCA, 2007.
[18]
C. Villavieja et al. Didi: Mitigating the performance impact of tlb shootdowns using a shared tlb directory. PACT, 2011.
[19]
E. Witchel, J. Cates, and K. Asanovic. Mondrian memory protection. Sigplan Notices, 37:304--316, 2002.
[20]
S. Woo et al. The splash-2 programs: characterization and methodological considerations. ISCA, 1995.
[21]
P. Zhou, F. Qin, et al. iwatcher: Efficient architectural support for software debugging. ISCA, 2004.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '13: Proceedings of the 50th Annual Design Automation Conference
May 2013
1285 pages
ISBN:9781450320719
DOI:10.1145/2463209
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 May 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. TLB
  2. filtering
  3. metadata cache
  4. optimization
  5. watchpoints

Qualifiers

  • Research-article

Conference

DAC '13
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 168
    Total Downloads
  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)2
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media