{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:10Z","timestamp":1750306570478,"version":"3.41.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2014,9,8]],"date-time":"2014-09-08T00:00:00Z","timestamp":1410134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGBED Rev."],"published-print":{"date-parts":[[2014,9,23]]},"abstract":"<jats:p>Embedded virtualization possesses inherent challenges which differentiate the domain from traditional virtualization application fields such as server and desktop computing. Standard software virtualization solutions have a negative impact, not only on memory footprint and performance, but also on determinism and interrupt latency which are critical for the embedded real-time domain. Thus, efficient embedded virtualization requires domain-specific software and hardware support.<\/jats:p>\n          <jats:p>This paper presents work in progress results of hardware-based Hypervisor implementation. The use cases of embedded virtualization are analyzed, justifying the reasoning for hardware-supported virtualization. Architectural and micro-architectural improvements to an ARM v5TE processor are described, demonstrating the performance advantages, and compared against ARM Virtualization Extensions, identifying respective vulnerabilities and providing alternative solutions which enable higher flexibility, minimizing virtualization costs. The research roadmap towards a hardware-complete Hypervisor, based on the presented results, is described.<\/jats:p>","DOI":"10.1145\/2668138.2668145","type":"journal-article","created":{"date-parts":[[2014,9,9]],"date-time":"2014-09-09T14:39:29Z","timestamp":1410273569000},"page":"45-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards hardware embedded virtualization technology"],"prefix":"10.1145","volume":"11","author":[{"given":"Paulo","family":"Garcia","sequence":"first","affiliation":[{"name":"University of Minho, Guimar\u00e3es, Portugal"}]},{"given":"Tiago","family":"Gomes","sequence":"additional","affiliation":[{"name":"University of Minho, Guimar\u00e3es, Portugal"}]},{"given":"Filipe","family":"Salgado","sequence":"additional","affiliation":[{"name":"University of Minho, Guimar\u00e3es, Portugal"}]},{"given":"Joao","family":"Monteiro","sequence":"additional","affiliation":[{"name":"University of Minho, Guimar\u00e3es, Portugal"}]},{"given":"Adriano","family":"Tavares","sequence":"additional","affiliation":[{"name":"University of Minho, Guimar\u00e3es, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2014,9,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.36"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2010.50"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435461"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.53"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2010.11"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361073"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMS.2010.150"},{"key":"e_1_2_1_8_1","first-page":"V1 1","volume-title":"2010 2nd International Conference on","volume":"1","author":"Guo Y.","year":"2010","unstructured":"Y. Guo , X. Wang , W. Dong , G. Shi , and Y. Li , \" A cooperative model virtual-machine monitor based on multi-core platform,\" in Future Computer and Communication (ICFCC) , 2010 2nd International Conference on , vol. 1 , May 2010 , pp. V1 - 802 --V 1 - 807 . Y. Guo, X. Wang, W. Dong, G. Shi, and Y. Li, \"A cooperative model virtual-machine monitor based on multi-core platform,\" in Future Computer and Communication (ICFCC), 2010 2nd International Conference on, vol. 1, May 2010, pp. V1-802--V1-807."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRCCS.2009.65"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaGrid.2010.54"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103813"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA.2011.26"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2050291"},{"key":"e_1_2_1_14_1","first-page":"1","volume-title":"2010 IEEE 16th International Symposium on","author":"Champagne D.","year":"2010","unstructured":"D. Champagne and R. Lee , \" Scalable architectural support for trusted software,\" in High Performance Computer Architecture (HPCA) , 2010 IEEE 16th International Symposium on , Jan 2010 , pp. 1 -- 12 . D. Champagne and R. Lee, \"Scalable architectural support for trusted software,\" in High Performance Computer Architecture (HPCA), 2010 IEEE 16th International Symposium on, Jan 2010, pp. 1--12."},{"key":"e_1_2_1_16_1","article-title":"State-of-the-art of virtualization, its security threats and deployment models","volume":"2","author":"Bazargan M. J. Z. F.","year":"2012","unstructured":"M. J. Z. F. Bazargan , C. Y. Yeun , \" State-of-the-art of virtualization, its security threats and deployment models ,\" International Journal for Information Security Research (IJISR) , vol. 2 , September\/December 2012 . M. J. Z. F. Bazargan, C. Y. Yeun, \"State-of-the-art of virtualization, its security threats and deployment models,\" International Journal for Information Security Research (IJISR), vol. 2, September\/December 2012.","journal-title":"International Journal for Information Security Research (IJISR)"},{"key":"e_1_2_1_17_1","first-page":"1","volume-title":"CCNC 2009","author":"Armand F.","year":"2009","unstructured":"F. Armand and M. Gien , \" A practical look at micro-kernels and virtual machine monitors,\" in Consumer Communications and Networking Conference, 2009 . CCNC 2009 . 6th IEEE, Jan 2009 , pp. 1 -- 7 . F. Armand and M. Gien, \"A practical look at micro-kernels and virtual machine monitors,\" in Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE, Jan 2009, pp. 1--7."},{"key":"e_1_2_1_18_1","first-page":"1","volume-title":"2010 21st IEEE International Symposium on","author":"Aguiar A.","year":"2010","unstructured":"A. Aguiar and F. Hessel , \" Embedded systems' virtualization: The next challenge?\" in Rapid System Prototyping (RSP) , 2010 21st IEEE International Symposium on , June 2010 , pp. 1 -- 7 . A. Aguiar and F. Hessel, \"Embedded systems' virtualization: The next challenge?\" in Rapid System Prototyping (RSP), 2010 21st IEEE International Symposium on, June 2010, pp. 1--7."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024925"},{"key":"e_1_2_1_20_1","first-page":"1","volume-title":"CCNC 2009","author":"Heiser G.","year":"2009","unstructured":"G. \" Heiser , \"Hypervisors for consumer electronics,\" in Consumer Communications and Networking Conference, 2009 . CCNC 2009 . 6th IEEE, Jan 2009 , pp. 1 -- 5 . G. \"Heiser, \"Hypervisors for consumer electronics,\" in Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE, Jan 2009, pp. 1--5."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1812598.1812635"},{"key":"e_1_2_1_22_1","first-page":"5","volume-title":"2010 IEEE\/AIAA 29th","author":"Gaska T.","year":"2010","unstructured":"T. Gaska , B. Werner , and D. Flagg , \" Applying virtualization to avionics systems 2014; the integration challenges,\" in Digital Avionics Systems Conference (DASC) , 2010 IEEE\/AIAA 29th , Oct 2010 , pp. 5 .E.1-1--5.E.1-19. T. Gaska, B. Werner, and D. Flagg, \"Applying virtualization to avionics systems 2014; the integration challenges,\" in Digital Avionics Systems Conference (DASC), 2010 IEEE\/AIAA 29th, Oct 2010, pp. 5.E.1-1--5.E.1-19."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278545"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455229.1455231"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.121"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2012.60"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2009.33"},{"key":"e_1_2_1_28_1","unstructured":"LynuxWorks \"\"low-level & boot-level rootkits revisited\" \" \"White Paper - http:\/\/www.slideshare.net\/aziv69\/whitepaper-lynx-secure-rootkit-detection-protection-by-means-of-secure-virtualization Tech. Rep.  LynuxWorks \"\"low-level & boot-level rootkits revisited\" \" \"White Paper - http:\/\/www.slideshare.net\/aziv69\/whitepaper-lynx-secure-rootkit-detection-protection-by-means-of-secure-virtualization Tech. Rep."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038651"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1967021.1967025"},{"key":"e_1_2_1_31_1","unstructured":"S. Yoder \"Kvm on embedded power architecture platforms \" KVM Forum Vancouver Canada - August 2011.  S. Yoder \"Kvm on embedded power architecture platforms \" KVM Forum Vancouver Canada - August 2011."}],"container-title":["ACM SIGBED Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2668138.2668145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2668138.2668145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:22Z","timestamp":1750227202000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2668138.2668145"}},"subtitle":["architectural enhancements to an ARM SoC"],"short-title":[],"issued":{"date-parts":[[2014,9,8]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,9,23]]}},"alternative-id":["10.1145\/2668138.2668145"],"URL":"https:\/\/doi.org\/10.1145\/2668138.2668145","relation":{},"ISSN":["1551-3688"],"issn-type":[{"type":"electronic","value":"1551-3688"}],"subject":[],"published":{"date-parts":[[2014,9,8]]},"assertion":[{"value":"2014-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}