Title :
Implementing a Simple Trap and Emulate VMM for the ARM Architecture
Author :
Suzuki, A. ; Oikawa, S.
Author_Institution :
Dept. of Comput. Sci., Univ. of Tsukuba, Tsukuba, Japan
Abstract :
There are several advantages to use virtual machine monitors (VMMs) for better security, reliability, and/or availability of systems. As embedded systems become more complex and open systems, there are more reasons to employ VMMs on embedded systems. Although there are more temptations to use VMMs, there are only a small number of VMMs available for embedded systems, and more of them are commercial proprietary software. Therefore, we decided to develop our own VMM on the ARM processor. We call it SIVARM: a simple VMM for the ARM architecture, because it is based on a simple trap and emulation model to virtualize the ARM processor. Since the VMM executes in privileged mode and its guest OS executes in non-privileged mode, the VMM can catch the execution of sensitive instructions as exceptions and emulate them appropriately. The guest OS can execute in non-privileged mode thanks to the virtual banked registers and the virtual processor mode provided by the VMM. The VMM was implemented for the ARM 1136JF-S processor, and can successfully boot Linux on it.
Keywords :
computer architecture; microprocessor chips; security of data; virtual machines; ARM 1136JF-S processor; ARM architecture; VMM; complex systems; embedded systems; open systems; simple trap implementation; virtual machine monitor; virtual processor mode; Access control; Computer architecture; Emulation; Linux; Monitoring; Registers; Virtual machine monitors; ARM Processor Architecture; Virtual Machine Monitor;
Conference_Titel :
Embedded and Real-Time Computing Systems and Applications (RTCSA), 2011 IEEE 17th International Conference on
Conference_Location :
Toyama
Print_ISBN :
978-1-4577-1118-3
DOI :
10.1109/RTCSA.2011.26