Aggressive Dynamic Execution of Multimedia Kernel Traces
نویسندگان
چکیده
There has been relatively little analytical work on processor optimizations for multimedia applications. With the introduction of MMX by Intel, it is clear that this is an area of increasing importance. Building on previous work [4, 5, 6, 7, 13, 14], we propose optimizations for multimedia architectures that support independent parallel execution of instructions within dynamically assembled traces, resulting in dramatic performance improvements. Specifically, we propose simplified instruction scheduling and register renaming algorithms due to constraints on trace formation. In addition, we suggest specific instruction pool and trace cache parameters. We constructed a simulator in order to measure the benefits of these processor optimizations for multimedia applications. The simulated machine, which could fetch/decode 2 instructions per cycle, performed better than a superscalar machine that could fetch/decode 8 instructions per cycle. Execution rates as high as 7.3 instructions per cycle were achieved for the benchmarks simulated, assuming 16 instructions per trace.
منابع مشابه
Aggressive Dynamic Execution of Decoded
In this paper, we consider the increased performance that can be obtained by using, in concert , three previously proposed enhancements. These enhancements are aggressive dynamic (run time) instruction scheduling, the reuse of decoded instructions, and trace scheduling (both aggressive dynamic instruction scheduling and decoded instruction reuse have been used in commercial systems). We show th...
متن کاملDyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملPerformance Benefits of Special-Purpose Instructions in the CSI Architecture
The Complex Streamed Instruction Set (CSI) architecture was proposed in order to overcome the limitations of existing multimedia-oriented ISA extensions, such as Intel’s MMX and SSE. One of the main limitations is the large amount of instructions which has to be executed. In CSI, instructions operate on data streams of arbitrarylength, which allows to dramatically reduce the instruction counts ...
متن کاملToward Revealing Kernel Malware Behavior in Virtual Execution Environments
Using a sandbox for malware analysis has proven effective in helping people quickly understand the behavior of unknown malware. This technique is also complementary to other malware analysis techniques such as static code analysis and debugger-based code analysis. This paper presents Rkprofiler, a sandbox-based malware tracking system that dynamically monitors and analyzes the behavior of Windo...
متن کاملImproving Program Comprehension in Operating System Kernels with Execution Trace Information
Operating systems are one of the most complex kinds of software systems ever built. Their complexity results from many factors, in special, the huge size and low-level issues. As consequence, there are many programming challenges to be considered at either the in-the-large level or in-the-small level. Program comprehension is a crucial problem for developers who need to contribute or reuse the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998