Journal of Innovative Research in Engineering Sciences

Issn:2476-7611

Article

The Effect of Code Generation Parameters on VEX VLIW Processor

Motahhareh Moravvej Hamedani
Abstract

Embedded systems have a significant character in the present day computing which their domain of applications has extended into many filed like manufacturing, remedy and home automation. In this paper we wants to search about influences of one of such processors in recent technologies. For doing this, in the first section of this paper, we provide reader with general information about Nios processors, and we review some of the main characteristics of this chipset family in comparison with others. In the second section, we review about different flags which are existed in these processors, and how to use such flags. Section 3, will present some real tests on such processors and test the optimality of these processors.

Published on the web: 2018-09-24
Received : 2018-07-18
Submitting : 2018-06-14
Keywords
Keyword:1- Chipset design
Keyword:2- VLIW Processor
Keyword:3- Code generation parameter

File Article

Download pdf download article

Reference

  1. Anjam F, Nadeem M, Wong S. Targeting code diversity with run-time adjustable issue-slots in a chip multiprocessor. InDesign, Automation & Test in Europe Conference & Exhibition (DATE), 2011 2011 Mar 14 (pp. 1-6). IEEE.[Scholar]
  2. Brandon A, Wong S. Support for dynamic issue width in VLIW processors using generic binaries. InDesign, Automation & Test in Europe Conference & Exhibition (DATE), 2013 2013 Mar 18 (pp. 827-832). IEEE.[Scholar]
  3. Abadi M, Budiu M, Erlingsson Ú, Ligatti J. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC). 2009 Oct 1;13(1):4. [Scholar]
  4. Aktas E, Ghose K. DARE: A framework for dynamic authentication of remote executions. InComputer Security Applications Conference, 2008. ACSAC 2008. Annual 2008 Dec 8 (pp. 453-462). IEEE. [Scholar]
  5. Arora D, Ravi S, Raghunathan A, Jha NK. Hardware-assisted run-time monitoring for secure program execution on embedded processors. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 2006 Dec;14(12):1295-308.. [Scholar]
  6. Payne A, Frow P. A strategic framework for customer relationship management. Journal of marketing. 2005 Oct 1;69(4):167-76.. [Scholar]
  7. Rostamzadeh C, Canavero F, Kashefi F, Darbandi M. Automotive AM-band radiated emission mitigation techniques, a practical approach. InElectromagnetic Compatibility (EMC), 2012 IEEE International Symposium on 2012 Aug 6 (pp. 162-166). IEEE. [Scholar]
  8. Darbandi M, Shahbazi P, Setayesh S, Granmo OC. New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing. InApplication of Information and Communication Technologies (AICT), 2012 6th International Conference on 2012 Oct 17 (pp. 1-5). IEEE. [Scholar]
  9. Bletsch T, Jiang X, Freeh V. Mitigating code-reuse attacks with control-flow locking. InProceedings of the 27th Annual Computer Security Applications Conference 2011 Dec 5 (pp. 353-362). ACM. [Scholar]
  10. Bletsch T, Jiang X, Freeh VW, Liang Z. Jump-oriented programming: a new class of code-reuse attack. InProceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011 Mar 22 (pp. 30-40). ACM. [Scholar]