Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization

被引:0
|
作者
Mhatre, Swapneel C. [1 ]
Chandran, Priya [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Comp Sci & Engn, Kozhikode 673601, Kerala, India
来源
IEEE ACCESS | 2025年 / 13卷
基金
新加坡国家研究基金会;
关键词
Virtualization; Security; Virtual machine monitors; Generators; Computer architecture; Pipelines; Timing; Registers; Virtual machines; Register transfer level; Compiler; computer architecture; hypervisor; operating system; security in virtualization; simulation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
All new computer architectures need to be performance evaluated for acceptance and simulation is the most widely used method for evaluation of new processor designs. Sharing resources with virtualization raised many security concerns, leading to the development of processors that are enhanced for security in virtualization. The simulators for processors enhanced for security in virtualization need to perform simulation of hypervisor instructions, simulation of security in virtualization, and simulation of new instructions. However, a simulator with all of these three features is not found in the literature. Hence, this paper proposes an approach for the simulation of processors enhanced for security in virtualization that provides all these three features. For user convenience, the simulators are generated automatically from the target processor specifications using a simulator generator. The paper also proposes an approach for simulating a new pipeline with a designer-specified number of stages with automatic detection of pipeline hazards and automatic stalling or flushing of the pipeline on detection of hazards. To demonstrate the use of the simulator generator and the generated simulator, three case studies are considered - simulation of RISC-V with HyperWall, simulation of RISC-V with bit-serial dot-product unit, and simulation of RISC-V with Galois Field arithmetic extension. The paper concludes that the proposed approaches help in accurately simulating the overhead due to security in virtualization and also in providing flexibility to the designer to simulate the desired processor configurations.
引用
收藏
页码:11930 / 11943
页数:14
相关论文
共 50 条
  • [31] Automatic data path generation from C code for custom processors
    Trajkovic, Jelena
    Gajski, Daniel
    EMBEDDED SYSTEM DESIGN: TOPICS, TECHNIQUES AND TRENDS, 2007, 231 : 107 - 120
  • [32] Automatic Software-Based Self Test Generation for Embedded Processors
    Hudec, Jan
    IFAC PAPERSONLINE, 2018, 51 (06): : 125 - 130
  • [33] AUTOMATIC GENERATION OF EFFICIENT LEXICAL PROCESSORS USING FINITE STATE TECHNIQUES
    JOHNSON, WL
    PORTER, JH
    ACKLEY, SI
    ROSS, DT
    COMMUNICATIONS OF THE ACM, 1968, 11 (12) : 805 - &
  • [34] Wordnet Enhanced Automatic Crossword Generation
    Aherne, Aoife
    Vogel, Carl
    GWC 2006: THIRD INTERNATIONAL WORDNET CONFERENCE, PROCEEDINGS, 2005, : 139 - 145
  • [35] AN APPROACH FOR AUTOMATIC-GENERATION OF SIMULATORS FOR A CLASS OF RANDOM-ACCESS ALGORITHMS
    RAO, TS
    BOSE, SK
    SRIVATHSAN, KR
    IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1993, 13 : 129 - 140
  • [36] Security in Network Virtualization: A Survey
    Jee, Seung Hun
    Park, Ji Su
    Shon, Jin Gon
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (04): : 801 - 817
  • [37] Virtualization: What Are the Security Risks?
    Fanning, Kurt
    Cannon, David M.
    JOURNAL OF CORPORATE ACCOUNTING AND FINANCE, 2011, 22 (05): : 41 - 44
  • [38] Security Issues in Virtualization Environment
    Anand, R.
    Sarswathi, S.
    Regan, R.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 254 - 256
  • [39] Security requirement for mobile virtualization
    Lee, Hyunjung
    Won, Dongho
    ASIA LIFE SCIENCES, 2015, : 217 - 228
  • [40] Virtualization sparks security concerns
    Vaughan-Nichols, Steven J.
    COMPUTER, 2008, 41 (08) : 13 - 15