期刊文献+

自修改代码在Godson-X上的处理实现 被引量:1

Self-modifying Code Implementation on Godson-X
在线阅读 下载PDF
导出
摘要 主流处理器中采用的超标量流水线机制及高速缓存使得SMC操作需要特殊处理。该文基于对多种程序的SMC行为的分析和多种SMC冲突的解决方案的对比,设计了一种灵活高效的SMC解决方法。该方法对结构的复杂度及主流水线的性能的影响小,目前已被应用在支持CISC指令集的Godsonx处理器模型上。 The act of a processor writing data into a currently executing code segment with the intent of executing that data as code is called self-modifying code. As processor architectures become more complex and start to speculatively execute code ahead of the retirement point, the rules regarding which code should execute, pre- or post-modification, become blurred. Although SMC seldom happens in current normal applications, it is necessary to handle this situation for programs with SMC. This paper analyses several methods for SMC handling, and gives a facile method that can be easily implemented. This method has been implemented on Godson-X processor model.
作者 张浩 钱学海
出处 《计算机工程》 CAS CSCD 北大核心 2008年第3期102-104,共3页 Computer Engineering
关键词 自修改代码 超标量流水线 指令高速缓存 self modifying code superscalar pipeline instruction high speed cache
  • 相关文献

参考文献5

  • 1Bery B B. The Intel Microprocessors, Architecture, Programming, and Interfacing[M]. 6th ed. London: Prentice Hall, 2003.
  • 2Intel. Method and Apparatus for Emulating Self-modifying Code[Z]. 2003.
  • 3Intel. IA-32 Intel Architecture Software Developer's Manuals[Z]. 2005.
  • 4Dehnert J C, Grant B K. The Transmeta Code Morphing Software[C]//Proc. of International Symposium on Code Generation and Optimization. [S. l.]: IEEE Press, 2003.
  • 5Keltcher C N, McGrath K J, Ahmed A, et al. The AMD Opteron Processor for Multiprocessor Servers[J]. IEEE Micro, 2003, 23(2): 66-76.

同被引文献10

  • 1莫翾晟,林和,蔡万景,刘芳,李永礼.基于RSA算法与自修改机制的软件保护[J].计算机研究与发展,2006,43(z2):140-144. 被引量:3
  • 2Self-modifying code [EB/OL]. (2009-04) [2014-01 ].http :// en. wikipedia, org/wiki/Self- modifying code.
  • 3KANZAKI Y, MONDEN A, NAKAMURA M, et al. Exploiting selfmodication mechanism for program protection[C]. In:Proceedings of the 27th Annual International Computer Software and Applications Conference, USA: IEEE Press, 2003: 170-181.
  • 4MADOU M, ANCKAERT B, MOSELEY P, et al. Software protection through dynamic code mutation[C]. In: Proceed- ings of Information Security Applications Conference, USA: ACM Press, 2005:194-206.
  • 5Intel.IA- 32 Intel architecture software developer' s manu- als[Z]. 2005.
  • 6GSCHWIND M, ALTMAN E, SATHAYE S, et al. Dynamic and transparent binary translation[J]. IEEE Computer Soci- ety, 2000,33(3):54-59.
  • 7EBCIOGLU K, ALTMAN E. DAISY: dynamic compilaton for 100 percent architectural compatibility[C]. In: Proceed- ings of ISCA24, New York: ACM Press, 1997:26-37.
  • 8QEMU: The open source processor emulator[EB/OL]. (2010-03-31)[2014-01 - 26 ]. http ://fabriee. bellard, free. fr/ qemu / about, html.
  • 9BELLARD F. QEMU, a fast and portable dynamic trans- lator[C]. USENIX Annual Technical Conference, APR 10-15, USENIX Association Proceedings of the Freenix/ Open Source Track, 2005:41-46.
  • 10SMITH J, NAIR R. Virtual machines: versatile platforms for systems and processes[M]. Morgan Kaufmann, 2005.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部