Automatic Generation of Simulators for Processors Enhanced for Security in Virtualization

被引:0
|
作者
Mhatre, Swapneel C. [1 ]
Chandran, Priya [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Comp Sci & Engn, Kozhikode 673601, Kerala, India
来源
IEEE ACCESS | 2025年 / 13卷
基金
新加坡国家研究基金会;
关键词
Virtualization; Security; Virtual machine monitors; Generators; Computer architecture; Pipelines; Timing; Registers; Virtual machines; Register transfer level; Compiler; computer architecture; hypervisor; operating system; security in virtualization; simulation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
All new computer architectures need to be performance evaluated for acceptance and simulation is the most widely used method for evaluation of new processor designs. Sharing resources with virtualization raised many security concerns, leading to the development of processors that are enhanced for security in virtualization. The simulators for processors enhanced for security in virtualization need to perform simulation of hypervisor instructions, simulation of security in virtualization, and simulation of new instructions. However, a simulator with all of these three features is not found in the literature. Hence, this paper proposes an approach for the simulation of processors enhanced for security in virtualization that provides all these three features. For user convenience, the simulators are generated automatically from the target processor specifications using a simulator generator. The paper also proposes an approach for simulating a new pipeline with a designer-specified number of stages with automatic detection of pipeline hazards and automatic stalling or flushing of the pipeline on detection of hazards. To demonstrate the use of the simulator generator and the generated simulator, three case studies are considered - simulation of RISC-V with HyperWall, simulation of RISC-V with bit-serial dot-product unit, and simulation of RISC-V with Galois Field arithmetic extension. The paper concludes that the proposed approaches help in accurately simulating the overhead due to security in virtualization and also in providing flexibility to the designer to simulate the desired processor configurations.
引用
收藏
页码:11930 / 11943
页数:14
相关论文
共 50 条
  • [41] Effects of virtualization on information security
    Li, Shing-Han
    Yen, David C.
    Chen, Shih-Chih
    Chen, Patrick S.
    Lu, Wen-Hui
    Cho, Chien-Chuan
    COMPUTER STANDARDS & INTERFACES, 2015, 42 : 1 - 8
  • [42] An approach for automatic data virtualization
    Weng, L
    Agrawal, G
    Catalyurek, U
    Kurc, T
    Narayanan, S
    Saltz, J
    13TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 24 - 33
  • [43] An Overview of Chip Multi-Processors Simulators Technology
    Al-Manasia, Malik
    Chaczko, Zenon
    PROGRESS IN SYSTEMS ENGINEERING, 2015, 366 : 877 - 884
  • [44] Rapid exploration of pipelined processors through automatic generation of synthesizable RTL models
    Mishra, P
    Kejariwal, A
    Dutt, N
    14TH IEEE INTERNATIONAL WORKSHOP ON RAPID SYSTEMS PROTOTYPING, PROCEEDINGS: SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE, 2003, : 226 - 232
  • [45] Automatic functional test program generation for pipelined processors using model checking
    Mishra, P
    Dutt, N
    SEVENTH IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2002, : 99 - 103
  • [46] AnBx: Automatic generation and verification of security protocols implementations
    School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom
    Lect. Notes Comput. Sci., (156-173):
  • [47] AGVI - Automatic generation, verification, and implementation of security protocols
    Song, D
    Perrig, A
    Phan, D
    COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 241 - 245
  • [48] An XML-Based ADL Framework for Automatic Generation of Multithreaded Computer Architecture Simulators
    Barnes, Christopher
    Vaidya, Pranav
    Lee, Jaehwan John
    IEEE COMPUTER ARCHITECTURE LETTERS, 2009, 8 (01) : 13 - 16
  • [49] Attack Mitigation Through Memory Encryption of Security-Enhanced Commodity Processors
    Henson, Michael
    Taylor, Stephen
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 265 - 268
  • [50] Automatic Generation and Enforcement of Security Contract for Pervasive Application
    Jin, Ying
    Li, Zepeng
    Wei, Da
    Liu, Lei
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 55 - 60