Reconciling Performance and Security in Modern Computer Architecture

Sparad:
Bibliografiska uppgifter
I publikationen:ProQuest Dissertations and Theses (2025)
Huvudupphov: Pal, Asmita
Utgiven:
ProQuest Dissertations & Theses
Ämnen:
Länkar:Citation/Abstract
Full Text - PDF
Taggar: Lägg till en tagg
Inga taggar, Lägg till första taggen!

MARC

LEADER 00000nab a2200000uu 4500
001 3244162650
003 UK-CbPIL
020 |a 9798291571361 
035 |a 3244162650 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Pal, Asmita 
245 1 |a Reconciling Performance and Security in Modern Computer Architecture 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a The relentless pursuit of performance has driven significant innovation in computer architecture, yielding systems that are faster, more efficient, and increasingly specialized. This momentum is fueled by the growing heterogeneity of modern applications, which demand tailored, domain-specific optimizations. However, this performance race comes at a cost, as many optimizations inadvertently introduce covert channels - unintended paths that can inadvertently leak sensitive information. As more computation migrates to the cloud, this attack surface expands, raising a fundamental question: “How secure is our information?” Alarmingly, even when data is encrypted, adversaries can often infer private details by observing system behavior. Over the past decade, a wave of research has revealed how subtle interactions between software and hardware can give rise to side-channel vulnerabilities, enabling attackers to extract secrets without breaking cryptographic guarantees. These developments have made it increasingly difficult to simultaneously achieve high performance and strong security. This work argues that to achieve both trustworthiness and efficiency, system architects must rigorously account for the trade-offs between performance and security.To support this argument, this dissertation investigates three scenarios where this trade-off is pronounced. First, it addresses the challenge of sharing program traces for performance analysis without compromising trace security. Current techniques for generating realistic traces capture a range of behaviors necessary to be evaluated, containing a lot of information about the application, its inputs and the underlying system on which it was generated. Consequently, generating traces from real-world executions risk leakage of sensitive information. To prevent this, traces can be obfuscated before release. However, this can undermine their ideal utility, i.e., how realistically a program behavior was captured. To bridge this gap, we develop Camouflage, a trace obfuscation framework that systematically balances trace utility and input confidentiality through semantically guided transformations. Second, it examines Fully Homomorphic Encryption - first through the lens of privacy, and then from a performance characterization perspective. It reveals that encrypted computations remain vulnerable to side-channel leakage through memory access patterns. Separately, it presents CryptOracle, a modular framework that enables fast, interpretable performance estimation of FHE workloads without the need for full-system simulation. Finally, the dissertation explores vulnerability of on-chip interconnects, where existing defenses designed for core and cache interaction are rendered inadequate. It shows that while these networks are optimized for resource sharing, their contention patterns can be manipulated to form microarchitectural side-channels. A temporal isolation defense is adopted to enforce non-interference of secure and adversarial traffic. Together, these contributions advocate for a new design philosophy : one that treats performance and security not as competing objectives, but as deeply intertwined aspects of modern system design. By systematically characterizing these trade-offs and introducing frameworks to navigate them, this dissertation lays the foundation for designing future systems that are both high-performing and secure by design. 
653 |a Computer engineering 
653 |a Computer science 
653 |a Electrical engineering 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3244162650/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3244162650/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch