{"id":"https://openalex.org/W4244320837","doi":"https://doi.org/10.1109/micro.2002.1176268","title":"Microarchitectural denial of service: insuring microarchitectural fairness","display_name":"Microarchitectural denial of service: insuring microarchitectural fairness","publication_year":2003,"publication_date":"2003-06-26","ids":{"openalex":"https://openalex.org/W4244320837","doi":"https://doi.org/10.1109/micro.2002.1176268"},"language":"en","primary_location":{"id":"doi:10.1109/micro.2002.1176268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/micro.2002.1176268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"35th Annual IEEE/ACM International Symposium on Microarchitecture, 2002. (MICRO-35). Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059685104","display_name":"Dirk Grunwald","orcid":"https://orcid.org/0000-0002-3174-0904"},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"D. Grunwald","raw_affiliation_strings":["Department of Computer Science, University of Colorado, Boulder, CO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Colorado, Boulder, CO, USA","institution_ids":["https://openalex.org/I188538660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113668000","display_name":"Soraya Ghiasi","orcid":null},"institutions":[{"id":"https://openalex.org/I188538660","display_name":"University of Colorado Boulder","ror":"https://ror.org/02ttsq026","country_code":"US","type":"education","lineage":["https://openalex.org/I188538660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Ghiasi","raw_affiliation_strings":["Department of Computer Science, University of Colorado, Boulder, CO, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Colorado, Boulder, CO, USA","institution_ids":["https://openalex.org/I188538660"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059685104"],"corresponding_institution_ids":["https://openalex.org/I188538660"],"apc_list":null,"apc_paid":null,"fwci":0.5031,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.70170482,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8341013193130493},{"id":"https://openalex.org/keywords/multithreading","display_name":"Multithreading","score":0.5956937670707703},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5864867568016052},{"id":"https://openalex.org/keywords/simultaneous-multithreading","display_name":"Simultaneous multithreading","score":0.5615238547325134},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.5573517084121704},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.5419512391090393},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5020308494567871},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.49225249886512756},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.4721798002719879},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3809487521648407},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35102057456970215},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2812509834766388},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.26057663559913635}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8341013193130493},{"id":"https://openalex.org/C201410400","wikidata":"https://www.wikidata.org/wiki/Q1064412","display_name":"Multithreading","level":3,"score":0.5956937670707703},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5864867568016052},{"id":"https://openalex.org/C85717602","wikidata":"https://www.wikidata.org/wiki/Q82178","display_name":"Simultaneous multithreading","level":4,"score":0.5615238547325134},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.5573517084121704},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.5419512391090393},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5020308494567871},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.49225249886512756},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.4721798002719879},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3809487521648407},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35102057456970215},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2812509834766388},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26057663559913635},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/micro.2002.1176268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/micro.2002.1176268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"35th Annual IEEE/ACM International Symposium on Microarchitecture, 2002. (MICRO-35). Proceedings.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.47999998927116394,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W996249693","https://openalex.org/W2033629016","https://openalex.org/W2085830671","https://openalex.org/W2098771596","https://openalex.org/W2109659793","https://openalex.org/W2118532220","https://openalex.org/W3142147837","https://openalex.org/W4238816702","https://openalex.org/W4239988727","https://openalex.org/W4244264053","https://openalex.org/W4246870635","https://openalex.org/W4251557924","https://openalex.org/W4253421865","https://openalex.org/W6792903772"],"related_works":["https://openalex.org/W2118532220","https://openalex.org/W4240807263","https://openalex.org/W1532726325","https://openalex.org/W2115561485","https://openalex.org/W2354938433","https://openalex.org/W2913446311","https://openalex.org/W2294358097","https://openalex.org/W2482815832","https://openalex.org/W3142189107","https://openalex.org/W1594092496"],"abstract_inverted_index":{"Simultaneous":[0],"multithreading":[1],"seeks":[2],"to":[3,119,134],"improve":[4],"the":[5,30,75,90,126,142,183],"aggregate":[6],"computation":[7],"bandwidth":[8],"of":[9,32,59,67,81,94,97,117,182],"a":[10,53,60,70,79,115],"processor":[11,62,144],"core":[12,127,154],"by":[13,69,78],"sharing":[14,141],"resources":[15,35,99],"such":[16,121],"as":[17],"functional":[18],"units,":[19],"caches,":[20],"TLB":[21],"and":[22,100,113,130,174],"so":[23,166],"on.":[24],"To":[25],"date,":[26],"most":[27],"research":[28],"investigating":[29],"scheduling":[31,47,128,155],"these":[33],"shared":[34,98],"has":[36],"focused":[37],"on":[38,56],"enhancing":[39],"computational":[40],"bandwidth.":[41],"In":[42,157],"this":[43],"paper,":[44],"we":[45,50,87,159],"examine":[46],"fairness.":[48],"First,":[49],"show":[51,88,160],"that":[52,89,103,137,148,161,167,177],"thread":[54,77],"running":[55],"an":[57],"implementation":[58],"SMT":[61],"can":[63,163,169],"suffer":[64],"from":[65],"\"denial":[66],"service\"":[68],"malicious":[71,122,172],"thread,":[72],"slowing":[73],"down":[74],"original":[76],"factor":[80],"10-20.":[82],"Using":[83],"performance":[84],"counter":[85,120],"hardware,":[86],"slowdown":[91],"occurs":[92],"because":[93],"deliberate":[95],"misuse":[96],"design":[101],"decisions":[102],"are":[104],"necessary":[105],"for":[106],"high":[107],"speed":[108],"implementation.":[109],"We":[110,146],"then":[111],"propose":[112],"evaluate":[114],"number":[116],"mechanisms":[118,152],"behavior:":[123],"some":[124],"affect":[125,139],"algorithm":[129],"others":[131],"simply":[132],"attempt":[133],"identify":[135],"activity":[136,150],"would":[138],"threads":[140],"same":[143,184],"core.":[145],"find":[147],"harmful":[149,185],"based":[151],"outperform":[153],"mechanisms.":[156],"addition,":[158],"they":[162,168],"be":[164],"designed":[165],"differentiate":[170],"between":[171],"attacks":[173],"legitimate":[175],"activities":[176],"may":[178],"also":[179],"make":[180],"use":[181],"activities.":[186]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
