Affiliation:
1. University of Paderborn
Abstract
Application specific instruction-set processors combine an efficient general purpose core with special purpose functionality that is tailored to a particular application domain. Since the extension of an instruction set and its utilization are non-trivial tasks, sophisticated tools have to provide guidance and support during design. Feedback driven optimization allows for the highest level of specialization, but calls for a simulator that is aware of the newly proposed instructions, a compiler that makes use of these instructions without manual intervention, and an application program that is representative for the targeted application domain.In this paper we introduce an approach for the extension of instruction sets that is built around a concise yet powerful processor abstraction. The specification of a processor is well suited to automatically generate the important parts of a compiler backend and cycle-accurate simulator. A typical design cycle involves the execution of the representative application program, evaluation of performance statistics collected by the simulator, refinement of the processor specification guided by performance statistics, and update of the compiler and simulator according to the refined specification. We demonstrate the usefulness of our novel approach by example of an instruction set for symmetric ciphers.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Graphics and Computer-Aided Design,Software
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Power Internet Assets Security Threat Assessment based on the Cost of Security Protection;2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE);2022-04
2. Virtual Machine Support for Many-Core Architectures: Decoupling Abstract from Concrete Concurrency Models;Electronic Proceedings in Theoretical Computer Science;2010-02-06
3. Resource Efficiency of Instruction Set Extensions for Elliptic Curve Cryptography;Fifth International Conference on Information Technology: New Generations (itng 2008);2008-04