May 3, 2026
Goals
- Compare the performance of BoS prefetcher against baseline and cooprt.
- Learn about the internal workings of OpenAI triton in order to develop an attack.
What I worked on
- Compared the performance of BoS prefetcher with baseline and CoopRT.
- Ran simulations for a configuration with both CoopRT and BoS prefetcher enabled to check if we are able to bypass CoopRT.
- Setup Triton using the nvidia docker container toolkit, ran some prelimnary experiments
Key Insights
- Today I learnt that triton has it’s own intermediate representation, similar to the IR emitted by LLVM.
Questions / Confusions
- For the threat model of my attack I am considering scenario with a hostile user in an HPC clusters as HPC clusters do not enforce virtualization as strongly as the cloud providers.
Ideas / Hypotheses
- For my next security work either I can attack the llvm backend or the software caches used by tools like triton.
Papers / Resources
None
Next Steps
- If BoS prefetcher interacts positevely with CoopRT, I will try to incorporate RL in order to check if I can achieve better results than just naively combining both the ideas.
Introspection
- Today was Sunday, so I was not expecting to be very productive, but alas, the day turned out to be insightful :)