首页> 外文期刊>IEEE transactions on very large scale integration (VLSI) systems >Exploring Software Partitions for Fast Security Processing on a Multiprocessor Mobile SoC
【24h】

Exploring Software Partitions for Fast Security Processing on a Multiprocessor Mobile SoC

机译:探索用于在多处理器移动SoC上进行快速安全处理的软件分区

获取原文
获取原文并翻译 | 示例

摘要

The functionality of mobile devices, such as cell phones and personal digital assistants (PDAs), has evolved to include various applications where security is a critical concern (secure web transactions, mobile commerce, download and playback of protected audio/video content, connection to corporate private networks, etc.). Security mechanisms (e.g., secure communication protocols) involve cryptographic algorithms, and are often quite computationally intensive, challenging the constrained processing and battery resources of mobile devices. Extensive design effort and aggressive hardware and software optimizations are required to address this challenge. Previous work has addressed the design of hardware architectures (custom accelerators, domain-specific processors, etc.) to accelerate security processing, and many emerging systems-on-chip (SoCs) feature some form of hardware support for security. In this paper, we address the complementary problem of mapping a complex security software library to an SoC platform with security hardware enhancements. We present a systematic methodology for exploring the software architecture for security processing for a commercial heterogeneous multiprocessor SoC for mobile devices. The SoC contains multiple host processors executing applications and a dedicated programmable security processing engine. We developed an exploration methodology to map the code and data of security software libraries onto the platform, with the objective of maximizing the overall application-visible performance. The salient features of the methodology include: 1) the use of real performance measurements from a prototyping board, which contains the target platform, to drive the exploration; 2) a new data structure access profiling framework that allows us to accurately model the communication overheads involved in offloading a given set of functions to the security processor; and 3) an exact branch-and-bound-based design space exploration algorithm- that determines the best mapping of security library functions and data structures to the host and security processors. We used the proposed framework to map a commercial security library to the target mobile application SoC. The resulting optimized software architecture outperformed several manually designed software architectures, resulting in up to 12.5$times$ speed-up for individual cryptographic operations (encryption, hashing) and 2.26.2 $times$ speed-up for applications such as a digital rights management (DRM) agent and secure sockets layer (SSL) client. We also demonstrate the applicability of our framework to software architecture exploration in other multiprocessor scenarios.
机译:移动设备(例如手机和个人数字助理(PDA))的功能已发展到包括安全至关重要的各种应用(安全的网络交易,移动商务,受保护的音频/视频内容的下载和播放,与公司专用网络等)。安全机制(例如,安全通信协议)涉及密码算法,并且通常相当计算密集,挑战了移动设备的受限处理和电池资源。为了解决这一挑战,需要进行大量的设计工作以及积极的硬件和软件优化。先前的工作已经解决了用于加速安全处理的硬件体系结构(定制加速器,特定于域的处理器等)的设计,许多新兴的片上系统(SoC)具有某种形式的对安全性的硬件支持。在本文中,我们解决了将复杂的安全软件库映射到具有安全硬件增强功能的SoC平台的补充问题。我们提出了一种系统的方法,用于探索用于移动设备的商用异构多处理器SoC的安全处理软件体系结构。 SoC包含多个执行应用程序的主机处理器和一个专用的可编程安全处理引擎。我们开发了一种探索方法,可将安全软件库的代码和数据映射到平台上,以最大化整体应用程序可见的性能。该方法的显着特征包括:1)利用包含目标平台的原型开发板的实际性能测量结果来推动探索; 2)一个新的数据结构访问分析框架,该框架使我们能够准确地建模将给定功能集卸载到安全处理器所涉及的通信开销; 3)一种精确的基于分支和边界的设计空间探索算法,该算法确定安全库功能和数据结构到主机和安全处理器的最佳映射。我们使用提出的框架将商业安全库映射到目标移动应用SoC。最终优化的软件体系结构优于几种手动设计的软件体系结构,单个加密操作(加密,哈希)的速度提高了12.5美元,数字版权管理等应用的速度提高了2.26.2美元。 (DRM)代理和安全套接字层(SSL)客户端。我们还演示了我们的框架在其他多处理器方案中对软件体系结构探索的适用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号