C. Moratelli, R. Tiburski, S. J. Filho, Emanuel Moura, Everton de Matos, Fabiano Hessel
{"title":"MIPS和RISC-V:评估边缘设备的虚拟化权衡","authors":"C. Moratelli, R. Tiburski, S. J. Filho, Emanuel Moura, Everton de Matos, Fabiano Hessel","doi":"10.1109/WF-IoT54382.2022.10152084","DOIUrl":null,"url":null,"abstract":"In the run to improve security on Edge Devices, separation by software appears as a well-known technique that can be achieved by different means. In this work, we consider virtualization as a solution for separation. A virtualization layer has an intrinsic relationship with the underline hardware, where the processor's architecture plays an essential role in the achieved security and software complexity. In this way, we discuss the architectural differences between MIPS and RISC- V processor families regarding virtualization support, showing how the archi-tectural differences may affect a hypervisor's implementation in terms of performance and security. Finally, we expect that this study clarifies the existing trade-offs for virtualization and helps choose the hardware and software stacks for edge devices.","PeriodicalId":176605,"journal":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"MIPS and RISC-V: Evaluating Virtualization Trade-off for Edge Devices\",\"authors\":\"C. Moratelli, R. Tiburski, S. J. Filho, Emanuel Moura, Everton de Matos, Fabiano Hessel\",\"doi\":\"10.1109/WF-IoT54382.2022.10152084\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the run to improve security on Edge Devices, separation by software appears as a well-known technique that can be achieved by different means. In this work, we consider virtualization as a solution for separation. A virtualization layer has an intrinsic relationship with the underline hardware, where the processor's architecture plays an essential role in the achieved security and software complexity. In this way, we discuss the architectural differences between MIPS and RISC- V processor families regarding virtualization support, showing how the archi-tectural differences may affect a hypervisor's implementation in terms of performance and security. Finally, we expect that this study clarifies the existing trade-offs for virtualization and helps choose the hardware and software stacks for edge devices.\",\"PeriodicalId\":176605,\"journal\":{\"name\":\"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WF-IoT54382.2022.10152084\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WF-IoT54382.2022.10152084","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
MIPS and RISC-V: Evaluating Virtualization Trade-off for Edge Devices
In the run to improve security on Edge Devices, separation by software appears as a well-known technique that can be achieved by different means. In this work, we consider virtualization as a solution for separation. A virtualization layer has an intrinsic relationship with the underline hardware, where the processor's architecture plays an essential role in the achieved security and software complexity. In this way, we discuss the architectural differences between MIPS and RISC- V processor families regarding virtualization support, showing how the archi-tectural differences may affect a hypervisor's implementation in terms of performance and security. Finally, we expect that this study clarifies the existing trade-offs for virtualization and helps choose the hardware and software stacks for edge devices.