Page 141 - 《软件学报》2024年第6期
P. 141

谢汶兵 等: 二进制翻译技术综述                                                                2717


                      Electronics, 2023, 12(14): 3014. [doi: 10.3390/electronics12143014]
                 [87]  Fu SY, Hong DY, Liu YP, Wu JJ, Hsu WC. Optimizing data permutations in structured loads/stores translation and SIMD register
                      mapping for a cross-ISA dynamic binary translator. Journal of Systems Architecture, 2019, 98: 173–190. [doi: 10.1016/j.sysarc.2019.07.
                      008]
                 [88]  Wang Z, Li JJ, Wu CG, Yang DY, Wang ZJ, Hsu WC, Li B, Guan Y. HSPT: Practical implementation and efficient management of
                      embedded shadow page tables for cross-ISA system virtual machines. In: Proc. of the 11th ACM SIGPLAN/SIGOPS Int’l Conf. on
                      Virtual Execution Environments. Istanbul: Association for Computing Machinery, 2015. 53–64. [doi: 10.1145/2731186.2731188]
                 [89]  Faravelon A, Gruber O, Pétrot F. Optimizing memory access performance using hardware assisted virtualization in retargetable dynamic
                      binary translation. In: Proc. of the 2017 Euromicro Conf. on Digital System Design (DSD). Vienna: IEEE, 2017. 40–46. [doi: 10.1109/
                      DSD.2017.41]
                 [90]  Huang KL, Zhang FX, Li C, Niu G, Wu JR, Liu TY. BTMMU: An efficient and versatile cross-ISA memory virtualization. In: Proc. of
                      the 17th ACM SIGPLAN/SIGOPS Int’l Conf. on Virtual Execution Environments. Association for Computing Machinery, 2021. 71–83.
                      [doi: 10.1145/3453933.3454015]
                 [91]  Hu WW, Jin GJ, Wang WX, Zhang XC, Wang HD. LoongISA for compatibility with mainstream instruction set architecture. Scientia
                      Sinica Informationis, 2015, 45(4): 459–479 (in Chinese with English abstract). [doi: 10.1360/N112014-00300]

                 [92]  Kristien  M,  Spink  T,  Campbell  B,  Sarkar  S,  Stark  I,  Franke  B,  Böhm  I,  Topham  N.  Fast  and  correct  load-link/store-conditional
                      instruction  handling  in  DBT  systems.  IEEE  Trans.  on  Computer-aided  Design  of  Integrated  Circuits  and  Systems,  2020,  39(11):
                      3544–3554. [doi: 10.1109/TCAD.2020.3013048]
                 [93]  Almer O, Bohm I, Von Koch TE, Franke B, Kyle S, Seeker V, Thompson C, Topham N. Scalable multi-core simulation using parallel
                      dynamic binary translation. In: Proc. of the 2011 Int’l Conf. on Embedded Computer Systems: Architectures, Modeling and Simulation.
                      Samos: IEEE, 2011. 190–199. [doi: 10.1109/SAMOS.2011.6045461]
                 [94]  Natarajan R, Zhai A. Leveraging transactional execution for memory consistency model emulation. ACM Trans. on Architecture and
                      Code Optimization, 2015, 12(3): 29. [doi: 10.1145/2786980]
                 [95]  Dechev  D,  Pirkelbauer  P,  Stroustrup  B.  Understanding  and  effectively  preventing  the  ABA  problem  in  descriptor-based  lock-free
                      designs. In: Proc. of the 13th IEEE Int’l Symp. on Object/Component/Service-oriented Real-time Distributed Computing. Carmona:
                      IEEE, 2010. 185–192. [doi: 10.1109/ISORC.2010.10]
                 [96]  Rigo A, Spyridakis A, Raho D. Atomic instruction translation towards a multi-threaded QEMU. In: Proc. of the 30th European Conf. on
                      Modelling and Simulation. 2016. 587–595.
                 [97]  Jiang XW, Chen XL, Wang H, Chen HP. A parallel full-system emulator for risc architure host. In: Proc. of the 2013 Advances in
                      Computer Science and its Applications. Berlin: Springer, 2014. 1045–1052. [doi: 10.1007/978-3-642-41674-3_145]
                 [98]  Zhao ZY, Jiang Z, Chen Y, Gong XL, Wang WW, Yew PC. Enhancing atomic instruction emulation for cross-ISA dynamic binary
                      translation. In: Proc. of the 2021 IEEE/ACM Int’l Symp. on Code Generation and Optimization (CGO). Seoul: IEEE, 2021. 351–362.
                      [doi: 10.1109/CGO51591.2021.9370312]
                 [99]  Niu G, Zhang FX, Li XY. Eliminate the overhead of interrupt checking in full-system dynamic binary translator. In: Proc. of the 15th
                      ACM Int’l Conf. on Systems and Storage. Haifa: Association for Computing Machinery, 2022. 1–12. [doi: 10.1145/3534056.3534939]
                 [100]  Chakraborty S. Robustness between weak memory models. In: Proc. of the 21st Conf. on Formal Methods in Computer-aided Design
                      (FMCAD). New Haven: TU Wien Academic Press, 2021. 173–182. [doi: 10.34727/2021/isbn.978-3-85448-046-4_26]
                 [101]  Alglave J, Maranget L, Sarkar S, Sewell P. Fences in weak memory models. In: Proc. of the 22nd Int’l Conf. on Computer Aided
                      Verification. Edinburgh: Springer, 2010. 258–272. [doi: 10.1007/978-3-642-14295-6_25]
                 [102]  Lustig D, Trippel C, Pellauer M, Martonosi M. ArMOR: Defending against memory consistency model mismatches in heterogeneous
                      architectures. In: Proc. of the 42nd Annual Int’l Symp. on Computer Architecture (ISCA). Portland: ACM, 2015. 388–400. [doi: 10.1145/
                      2749469.2750378]
                 [103]  Hawkins  B,  Demsk  B,  Bruening  D,  Zhao  Q.  Optimizing  binary  translation  of  dynamically  generated  code.  In:  Proc.  of  the  2015
                      IEEE/ACM Int’l Symp. on Code Generation and Optimization (CGO). San Francisco: IEEE, 2015. 68–78. [doi: 10.1109/CGO.2015.
                      7054188]
                 [104]  Kamunyori J. Handling self-modifying code using software dynamic translation. In: Proc. of the 2007 Conf. on Diversity in Computing.
                      Orlando: Association for Computing Machinery, 2007. 32. [doi: 10.1145/1347787.1347807]
                 [105]  Liu AZ, Wang WQ. ASCMS: An accurate self-modifying code cache management strategy in binary translation. In: Proc. of the 2013
                      Int’l  Conf.  on  Information  Science  and  Cloud  Computing  Companion.  Guangzhou:  IEEE,  2013.  405–410.  [doi: 10.1109/ISCC-
                      C.2013.52]
   136   137   138   139   140   141   142   143   144   145   146