Implementations, Improvements & Implications of Hardware-Assisted

Total Page:16

File Type:pdf, Size:1020Kb

Implementations, Improvements & Implications of Hardware-Assisted Implementations, Improvements &Implications of Hardware- Assisted CFG-BasedControl Flow Integrity Schemes DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Technische Informatik eingereicht von Mario Telesklav, BSc. Matrikelnummer 01252288 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Ao.Univ.Prof.Dipl.-Ing. Dr.techn. Andreas Steininger Mitwirkung: Univ.Ass.Dipl.-Ing. Stefan Tauner Wien, 9. März 2021 Mario Telesklav Andreas Steininger Technische UniversitätWien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.at Implementations, Improvements &Implications of Hardware- Assisted CFG-BasedControl Flow Integrity Schemes DIPLOMA THESIS submitted in partial fulfillmentofthe requirements forthe degree of Diplom-Ingenieur in Computer Engineering by Mario Telesklav, BSc. Registration Number 01252288 to the Faculty of Informatics at the TU Wien Advisor: Ao.Univ.Prof.Dipl.-Ing. Dr.techn. Andreas Steininger Assistance: Univ.Ass.Dipl.-Ing. Stefan Tauner Vienna, 9th March, 2021 Mario Telesklav Andreas Steininger Technische UniversitätWien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.at Erklärung zur Verfassungder Arbeit Mario Telesklav, BSc. Hiermit erkläre ich, dass ichdieseArbeit selbständig verfasst habe,dass ichdie verwen- detenQuellenund Hilfsmittel vollständig angegeben habeund dass ichdie Stellen der Arbeit–einschließlichTabellen,Karten undAbbildungen –, dieanderen Werken oder dem Internet im Wortlaut oder demSinn nach entnommensind, aufjeden Fall unter Angabeder Quelleals Entlehnung kenntlich gemacht habe. Wien, 9. März 2021 Mario Telesklav v Danksagung IchmöchteinsbesonderemeinemBetreuerStefan Tauner für seine Anleitungbei der Erstellung dieser Arbeitund für all unsere bereicherndenDiskussionen danken. Sein Feedbackhat wesentlichzur Qualitätbeigetragen.Des Weiterenbin ichProf. Steininger für die Beratung zum Themader Arbeitund die Möglichkeit, sie in seinem Forschungsbereich schreiben zu können, sehr dankbar. Außerdem möchte ichmichbei meinenFreunden und meiner Familie für ihre Unterstüt- zung in jederHinsicht während meines Studiumsbedanken,vor allem in herausfordernden und stressigenZeiten. Sie haben diese Arbeit überhaupterst möglich gemacht. vii Acknowledgements Iwouldliketoespeciallythank my supervisor Stefan Taunerfor his guidancethroughout creatingthis thesis and all of our enriching discussions. His feedbackhas contributed greatly to the qualityofthe finalwork.Anotherthank yougoestoProf. Steininger for advising on thetopicand the possibilityofwriting it in his department. MoreoverIwant to thank my dearfriendsand familyfor theirsupportinall respects throughout my studies, particularly in challenging and stressful times. Theymade this work possibleinthe first place. ix Kurzfassung Die Möglichkeit, Speicherbereiche mit böser Absicht zu überschreiben, ist immer noch eine ernstzunehmende Sicherheitslücke vieler moderner Systeme. DieseSchwachstellen ermöglichen Code-Reuse Attacks (CRAs), beidenen bereits existierender Code für einen Angriffanstellevon eingeschleustenAnweisungen verwendetwird. CRAs sindinden letzten Jahrenbesondersrelevantgeworden.InCRAs leiten Angreifer den Kontrollfluss einesProgramms so um,dass er vombeabsichtigtenControl Flow Graph (CFG) ab- weicht,der allegültigen Sprünge, Funktionsaufrufe und Rücksprünge in einemProgramm darstellt. Eine weit verbreitete Maßnahme gegen solcheAngriffe istes, ControlFlow Integrity(CFI) sicherzustellen.Inden letzten 15 Jahren hat es dazuviele Vorschläge fürImplementierungen sowohl in Software als auchinHardware gegeben.Das zugrunde liegende Ziel ist immer zu überprüfen, ob dieProgrammausführungdem vorgesehenen CFGentspricht,indemdie Gültigkeit der Ziele vonindirekten Sprüngenzur Laufzeit sichergestellt wird. Hardware-unterstützteAnsätze weisennormalerweise eine bessere Performance auf als ImplementierungeninSoftware. Die meisten existierendenAnsätze wurdenjedochauf unterschiedlichen Plattformen und mitunterschiedlichen Benchmark- Anwendungen evaluiert,was quantitative Vergleiche der vorgestelltenErgebnisse kaum aussagekräftigmacht. In dieser Arbeitgehen wirzunächst auf dieGrundlagen vonCRAs einund geben einen Überblick über CFIimAllgemeinen. Wir konzentrieren unsanschließend auf Hardware- unterstützte CFI-Ansätze und beschreibenfünf solcher SchemataimDetail,die ver- schiedeneSchutzkonzepte einsetzen. Unser Hauptbeitrag bestehtinder Implementierung der verschiedenen Ansätze auf einer gemeinsamen Plattform,umeinen aussagekräftigen quantitativenVergleich zu ermöglichen. Außerdem präsentierenwir ein neues Schema, dasauf den unsererMeinungnachbesten Konzepten aufbautund diese verbessert. Unsere Ergebnissezeigen, dassCFG-basiertesDurchsetzen vonCFI in Hardware mit geringeren Kosten in Bezug auf Laufzeitund Codegröße erzieltwerden kann, als zuvor in akademischen Konzeptengezeigt wurde.Zugleichwerdenanderswo vernachlässigte Featuresberücksichtigt und die Hardwareanforderungen auf einem ähnlichen Niveau gehalten. Schlüsselwörter —CRA, ROP, JOP, CFG, CFI, RISC-V,SoftwareSecurity, Shadow Stack, Control Flow Transfer, EXCEC xi Abstract Potentialmemory corruption errorsare still aserious vulnerability of manymodern systems and can be maliciously exploited. Code-Reuse Attacks (CRAs), where code already presentinsome application is used for an attackinstead of injected instructions, are enabled by sucherrorsand have become particularly relevantinrecent years.InCRAs attackers redirectthe control flowofaprogram in away thatitdeviates from itsintended Control Flow Graph (CFG), thatrepresents all valid jumps,functioncalls and returns in aprogram. The enforcementofControl Flow Integrity (CFI)isawell-established mitigation technique against such CRAs, backedbymanyproposalsfor implementations both in software and hardware in the past 15years. Their underlying goalisalwaysto checkwhether program execution follows itsintendedCFG by checking the validityof control flowtransfer targets at runtime.Hardware-assisted approachesusuallyhavea better performance compared to implementationsinsoftware. However, most schemes proposed by academiawere evaluated on differentplatforms and differentbenchmark applications were used, whichmakes quantitativecomparisons of thepresented results hardlymeaningful. In this work we firstreprise the basics of CRAs and giveanoverviewofCFI in general. We then focus on hardware-assisted CFI approaches and describefive concreteschemesin detail, thatcoverawide range of differentprotection concepts. The maincontributionof this work is ameaningfulquantitative comparisonbasedonour implementations of these approachesonacommon platform.Inaddition, we presentanovel hardware-assistedCFI scheme called EXtensiveCFI EnforcementConcept(EXCEC), whichisbased on what we consider thebest conceptsand ideas of theexisting approaches. EXCEC improves some details and offers amore sound protection than most other schemes. Our finalresults showthathardware-enforcedCFG-based CFI can be achieved with significantlylower overheads on runtime and code size than previously presentedin academicconcepts, while stillimplementingfeatures that have been neglected elsewhere and keepinghardware utilization at asimilarlevel. Keywords —CRA, ROP, JOP, CFG, CFI, RISC-V,SoftwareSecurity, Shadow Stack, ControlFlowTransfer, EXCEC xiii Contents Kurzfassung xi Abstract xiii 1Introduction1 1.1 Motivation .................................2 1.2 Code-Reuse Attacks (CRAs) ....................... 5 1.3 Defense Concepts ..............................10 1.4 Aims and Contributions...........................11 2Control Flow Integrity(CFI)13 2.1 Threat Model................................13 2.2 Introduction to Control Flow Integrity (CFI)..............14 2.3 Control Flow Graph (CFG) ........................ 18 2.4 Implementing CFI ..............................21 3Hardware-Based CFI23 3.1 Concepts ..................................23 3.2 Challenges .................................. 29 3.3 Hardware-BasedCFI Implementations ...................31 4Implementation 41 4.1 DevelopmentPlatform &Environment...................41 4.2 Instruction SetArchitecture (ISA) Extension .............. 43 4.3 Implementation Details..........................44 4.4 Common Implementation Parameters ..................48 4.5 EXtensiveCFI EnforcementConcept (EXCEC)............. 49 5Instrumentation 57 5.1 Introduction ................................. 57 5.2 Challenges for CFI Instrumentation................... 60 5.3 GCC Plugin for CFI Instrumentation. .................. 62 6Evaluation 67 xv 6.1 Methodology ................................ 67 6.2 Benchmarks .................................69 6.3 Security ................................... 73 6.4 Performance .................................74 6.5 Code Size .................................. 78 6.6 Utilization ................................... 81 6.7 Final Comparison .............................. 84 7Conclusion 87 7.1 Future Work ................................88 ARaw Data91 A.1 Performance Overhead ............................ 91 A.2CodeSizeOverhead ............................ 92 ListofFigures 95 ListofTables 97 List of Listings 99 Acronyms 101 Bibliography 105 CHAPTER 1 Introduction To this day, errorsinprograms can stillbeexploited on most processors.Vulnerabilities, whichenable the manipulationofmemorycontents, are particularly common. We refer to such errorsasmemory errors in theremainderofthis work. An attackertypically wants to change program behavior, e.g., in order to execute malicious code with the privileges of some
Recommended publications
  • I.MX 8Quadxplus Power and Performance
    NXP Semiconductors Document Number: AN12338 Application Note Rev. 4 , 04/2020 i.MX 8QuadXPlus Power and Performance 1. Introduction Contents This application note helps you to design power 1. Introduction ........................................................................ 1 management systems. It illustrates the current drain 2. Overview of i.MX 8QuadXPlus voltage supplies .............. 1 3. Power measurement of the i.MX 8QuadXPlus processor ... 2 measurements of the i.MX 8QuadXPlus Applications 3.1. VCC_SCU_1V8 power ........................................... 4 Processors taken on NXP Multisensory Evaluation Kit 3.2. VCC_DDRIO power ............................................... 4 (MEK) Platform through several use cases. 3.3. VCC_CPU/VCC_GPU/VCC_MAIN power ........... 5 3.4. Temperature measurements .................................... 5 This document provides details on the performance and 3.5. Hardware and software used ................................... 6 3.6. Measuring points on the MEK platform .................. 6 power consumption of the i.MX 8QuadXPlus 4. Use cases and measurement results .................................... 6 processors under a variety of low- and high-power 4.1. Low-power mode power consumption (Key States modes. or ‘KS’)…… ......................................................................... 7 4.2. Complex use case power consumption (Arm Core, The data presented in this application note is based on GPU active) ......................................................................... 11 5. SOC
    [Show full text]
  • Part 1 of 4 : Introduction to RISC-V ISA
    PULP PLATFORM Open Source Hardware, the way it should be! Working with RISC-V Part 1 of 4 : Introduction to RISC-V ISA Frank K. Gürkaynak <[email protected]> Luca Benini <[email protected]> http://pulp-platform.org @pulp_platform https://www.youtube.com/pulp_platform Working with RISC-V Summary ▪ Part 1 – Introduction to RISC-V ISA ▪ What is RISC-V about ▪ Description of ISA, and basic principles ▪ Simple 32b implementation (Ibex by LowRISC) ▪ How to extend the ISA (CV32E40P by OpenHW group) ▪ Part 2 – Advanced RISC-V Architectures ▪ Part 3 – PULP concepts ▪ Part 4 – PULP based chips | ACACES 2020 - July 2020 Working with RISC-V Few words about myself Frank K. Gürkaynak (just call me Frank) Senior scientist at ETH Zurich (means I am old) working with Luca Studied / Worked at Universities: in Turkey, United States and Switzerland (ETHZ and EPFL) Involved in Digital Design, Low Power Circuits, Open Source Hardware Part of PULP project from the beginning in 2013 | ACACES 2020 - July 2020 Working with RISC-V RISC-V Instruction Set Architecture ▪ Started by UC-Berkeley in 2010 SW ▪ Contract between SW and HW Applications ▪ Partitioned into user and privileged spec ▪ External Debug OS ▪ Standard governed by RISC-V foundation ▪ ETHZ is a founding member of the foundation ISA ▪ Necessary for the continuity User Privileged ▪ Defines 32, 64 and 128 bit ISA Debug ▪ No implementation, just the ISA ▪ Different implementations (both open and close source) HW ▪ At ETH Zurich we specialize in efficient implementations of RISC-V cores | ACACES 2020 - July 2020 Working with RISC-V RISC-V maintains basically a PDF document | ACACES 2020 - July 2020 Working with RISC-V ISA defines the instructions that processor uses C++ program translated to RISC-V instructions defined by ISA.
    [Show full text]
  • BOOM): an Industry- Competitive, Synthesizable, Parameterized RISC-V Processor
    The Berkeley Out-of-Order Machine (BOOM): An Industry- Competitive, Synthesizable, Parameterized RISC-V Processor Christopher Celio David A. Patterson Krste Asanović Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2015-167 http://www.eecs.berkeley.edu/Pubs/TechRpts/2015/EECS-2015-167.html June 13, 2015 Copyright © 2015, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. The Berkeley Out-of-Order Machine (BOOM): An Industry-Competitive, Synthesizable, Parameterized RISC-V Processor Christopher Celio, David Patterson, and Krste Asanovic´ University of California, Berkeley, California 94720–1770 [email protected] BOOM is a work-in-progress. Results shown are prelimi- nary and subject to change as of 2015 June. I$ L1 D$ (32k) L2 data 1. The Berkeley Out-of-Order Machine BOOM is a synthesizable, parameterized, superscalar out- exe of-order RISC-V core designed to serve as the prototypical baseline processor for future micro-architectural studies of uncore regfile out-of-order processors. Our goal is to provide a readable, issue open-source implementation for use in education, research, exe and industry. uncore BOOM is written in roughly 9,000 lines of the hardware L2 data (256k) construction language Chisel.
    [Show full text]
  • Efficient Online Memory Error Assessment and Circumvention For
    Int. J. Critical Computer-Based Systems, Vol. 4, No. 3, 227{247 1 Efficient Online Memory Error Assessment and Circumvention for Linux with RAMpage Horst Schirmeier*, Ingo Korb, Olaf Spinczyk and Michael Engel Department of Computer Science 12, Technische Universit¨atDortmund, Otto-Hahn-Str. 16, 44221 Dortmund, Germany E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] *Corresponding author Abstract: Memory errors are a major source of reliability problems in computer systems. Undetected errors may result in program termination or, even worse, silent data corruption. Recent studies have shown that the frequency of permanent memory errors is an order of magnitude higher than previously assumed and regularly affects everyday operation. To reduce the impact of memory errors, we designed RAMpage, a purely software-based infrastructure to assess and circumvent permanent memory errors in a running commodity x86-64 Linux-based system. We briefly describe the design and implementation of RAMpage and present new results from an extensive qualitative and quantitative evaluation. These results show the efficiency of our approach { RAMpage is able to provide a smooth graceful degradation in the presence of permanent memory errors while requiring only a small overhead in terms of CPU time, energy, and memory space. Keywords: Memory errors; Software-based fault tolerance; DRAM chips; Silent data corruption; Operating systems; Reliable operation Biographical notes: Horst Schirmeier received his Diploma in Computer Science from Friedrich-Alexander-Universit¨atErlangen, Germany. He worked as a researcher in the System Software group at FAU Erlangen, and is currently working in the field of resilient infrastructure software and fault resilience assessment for the DanceOS project in the Embedded System Software group at Technische Universit¨atDortmund, Germany.
    [Show full text]
  • An Evaluation of Soft Processors As a Reliable Computing Platform
    Brigham Young University BYU ScholarsArchive Theses and Dissertations 2015-07-01 An Evaluation of Soft Processors as a Reliable Computing Platform Michael Robert Gardiner Brigham Young University - Provo Follow this and additional works at: https://scholarsarchive.byu.edu/etd Part of the Electrical and Computer Engineering Commons BYU ScholarsArchive Citation Gardiner, Michael Robert, "An Evaluation of Soft Processors as a Reliable Computing Platform" (2015). Theses and Dissertations. 5509. https://scholarsarchive.byu.edu/etd/5509 This Thesis is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of BYU ScholarsArchive. For more information, please contact [email protected], [email protected]. An Evaluation of Soft Processors as a Reliable Computing Platform Michael Robert Gardiner A thesis submitted to the faculty of Brigham Young University in partial fulfillment of the requirements for the degree of Master of Science Michael J. Wirthlin, Chair Brad L. Hutchings Brent E. Nelson Department of Electrical and Computer Engineering Brigham Young University July 2015 Copyright © 2015 Michael Robert Gardiner All Rights Reserved ABSTRACT An Evaluation of Soft Processors as a Reliable Computing Platform Michael Robert Gardiner Department of Electrical and Computer Engineering, BYU Master of Science This study evaluates the benefits and limitations of soft processors operating in a radiation-hardened FPGA, focusing primarily on the performance and reliability of these systems. FPGAs designs for four popular soft processors, the MicroBlaze, LEON3, Cortex- M0 DesignStart, and OpenRISC 1200 are developed for a Virtex-5 FPGA. The performance of these soft processor designs is then compared on ten widely-used benchmark programs.
    [Show full text]
  • A 32-Bit Synthesizable Processor Core
    IEIE Transactions on Smart Processing and Computing, vol. 4, no. 2, April 2015 http://dx.doi.org/10.5573/IEIESPC.2015.4.2.083 83 IEIE Transactions on Smart Processing and Computing Core-A: A 32-bit Synthesizable Processor Core Ji-Hoon Kim1,*, Jong-Yeol Lee2, and Ando Ki3 1 Department of Electronics Engineering, Chungnam National University / Daejeon, South Korea [email protected] 2 Division of Electronic Engineering, Chonbuk National University / Jeonju, South Korea [email protected] 3 R&D Center, Dynalith Systems / Daejeon, South Korea [email protected] * Corresponding Author: Ji-Hoon Kim Received November 20, 2014; Revised December 27, 2014; Accepted February 12, 2015; Published April 30, 2015 * Short Paper Review Paper: This paper reviews recent progress, possibly including previous works in a particular research topic, and has been accepted by the editorial board through the regular review process. Abstract: Core-A is 32-bit synthesizable processor core with a unique instruction set architecture (ISA). In this paper, the Core-A ISA is introduced with discussion of useful features and the development environment, including the software tool chain and hardware on-chip debugger. Core- A is described using Verilog-HDL and can be customized for a given application and synthesized for an application-specific integrated circuit or field-programmable gate array target. Also, the GNU Compiler Collection has been ported to support Core-A, and various predesigned platforms are well equipped with the established design flow to speed up the hardware/software co-design for a Core-A–based system. Keywords: Processor core, CPU, Embedded processor, Development environment 1.
    [Show full text]
  • Low-Power High Performance Computing
    Low-Power High Performance Computing Panagiotis Kritikakos August 16, 2011 MSc in High Performance Computing The University of Edinburgh Year of Presentation: 2011 Abstract The emerging development of computer systems to be used for HPC require a change in the architecture for processors. New design approaches and technologies need to be embraced by the HPC community for making a case for new approaches in system design for making it possible to be used for Exascale Supercomputers within the next two decades, as well as to reduce the CO2 emissions of supercomputers and scientific clusters, leading to greener computing. Power is listed as one of the most important issues and constraint for future Exascale systems. In this project we build a hybrid cluster, investigating, measuring and evaluating the performance of low-power CPUs, such as Intel Atom and ARM (Marvell 88F6281) against commodity Intel Xeon CPU that can be found within standard HPC and data-center clusters. Three main factors are considered: computational performance and efficiency, power efficiency and porting effort. Contents 1 Introduction 1 1.1 Report organisation . 2 2 Background 3 2.1 RISC versus CISC . 3 2.2 HPC Architectures . 4 2.2.1 System architectures . 4 2.2.2 Memory architectures . 5 2.3 Power issues in modern HPC systems . 9 2.4 Energy and application efficiency . 10 3 Literature review 12 3.1 Green500 . 12 3.2 Supercomputing in Small Spaces (SSS) . 12 3.3 The AppleTV Cluster . 13 3.4 Sony Playstation 3 Cluster . 13 3.5 Microsoft XBox Cluster . 14 3.6 IBM BlueGene/Q .
    [Show full text]
  • Exploring Coremark™ – a Benchmark Maximizing Simplicity and Efficacy by Shay Gal-On and Markus Levy
    Exploring CoreMark™ – A Benchmark Maximizing Simplicity and Efficacy By Shay Gal-On and Markus Levy There have been many attempts to provide a single number that can totally quantify the ability of a CPU. Be it MHz, MOPS, MFLOPS - all are simple to derive but misleading when looking at actual performance potential. Dhrystone was the first attempt to tie a performance indicator, namely DMIPS, to execution of real code - a good attempt, which has long served the industry, but is no longer meaningful. BogoMIPS attempts to measure how fast a CPU can “do nothing”, for what that is worth. The need still exists for a simple and standardized benchmark that provides meaningful information about the CPU core - introducing CoreMark, available for free download from www.coremark.org. CoreMark ties a performance indicator to execution of simple code, but rather than being entirely arbitrary and synthetic, the code for the benchmark uses basic data structures and algorithms that are common in practically any application. Furthermore, EEMBC carefully chose the CoreMark implementation such that all computations are driven by run-time provided values to prevent code elimination during compile time optimization. CoreMark also sets specific rules about how to run the code and report results, thereby eliminating inconsistencies. CoreMark Composition To appreciate the value of CoreMark, it’s worthwhile to dissect its composition, which in general is comprised of lists, strings, and arrays (matrixes to be exact). Lists commonly exercise pointers and are also characterized by non-serial memory access patterns. In terms of testing the core of a CPU, list processing predominantly tests how fast data can be used to scan through the list.
    [Show full text]
  • CPU and FFT Benchmarks of ARM Processors
    Proceedings of SAIP2014 Affordable and power efficient computing for high energy physics: CPU and FFT benchmarks of ARM processors Mitchell A Cox, Robert Reed and Bruce Mellado School of Physics, University of the Witwatersrand. 1 Jan Smuts Avenue, Braamfontein, Johannesburg, South Africa, 2000 E-mail: [email protected] Abstract. Projects such as the Large Hadron Collider at CERN generate enormous amounts of raw data which presents a serious computing challenge. After planned upgrades in 2022, the data output from the ATLAS Tile Calorimeter will increase by 200 times to over 40 Tb/s. ARM System on Chips are common in mobile devices due to their low cost, low energy consumption and high performance and may be an affordable alternative to standard x86 based servers where massive parallelism is required. High Performance Linpack and CoreMark benchmark applications are used to test ARM Cortex-A7, A9 and A15 System on Chips CPU performance while their power consumption is measured. In addition to synthetic benchmarking, the FFTW library is used to test the single precision Fast Fourier Transform (FFT) performance of the ARM processors and the results obtained are converted to theoretical data throughputs for a range of FFT lengths. These results can be used to assist with specifying ARM rather than x86-based compute farms for upgrades and upcoming scientific projects. 1. Introduction Projects such as the Large Hadron Collider (LHC) generate enormous amounts of raw data which presents a serious computing challenge. After planned upgrades in 2022, the data output from the ATLAS Tile Calorimeter will increase by 200 times to over 41 Tb/s (Terabits/s) [1].
    [Show full text]
  • Standard Product
    How to Run Industry-Standard Benchmarks on the Cyclone V SoC and Arria V SoC FPGAs Altera Technical Services 1 1 Overview 1.1 Introduction This how-to guide discusses how to obtain, compile and run industry-standard processor performance benchmarks on the Cyclone V SoC Development Kit. Using the steps outlined in this document, you can understand how to obtain and run benchmarks on your system and compare to the stated results. Once you have validated your system setup and measurement techniques using this document, you can choose additional benchmarks or create your own benchmarks which best represent your end application for performance analysis purposes. Because the dual-core ARM® Cortex™-A9 processor subsystem is the same architecture between the Cyclone V SoC and the Arria V SoC, the techniques described in this application note can be readily applied to the Arria V SoC Development Kit, although the Arria V SoC results will be faster because it has a maximum processor frequency of up to 1.05 GHz and a higher performance main memory subsystem. 1.2 Benchmark Overview CoreMark, Dhrystone, and Whetstone are processor core related benchmarks. Please refer to the table below to understand the goals of and hardware elements used by each benchmark. Benchmark Emphasis Hardware Elements Utilized CoreMark Processor core, cache memory read/write CPU Pipeline, L1 cache Dhrystone Integer and branch operations CPU Pipeline, Integer ALU, L1 cache Whetstone Floating point operations CPU Pipeline, NEON/FPU, L1 cache STREAM and LMbench are memory intensive benchmarks. They are commonly used and well respected benchmarks for measuring embedded system memory performance.
    [Show full text]
  • DSP Benchmark Results of the GR740 Rad-Hard Quad-Core LEON4FT
    The most important thing we build is trust ADVANCED ELECTRONIC SOLUTIONS AVIATION SERVICES COMMUNICATIONS AND CONNECTIVITY MISSION SYSTEMS DSP Benchmark Results of the GR740 Rad-Hard Quad-Core LEON4FT Cobham Gaisler June 16, 2016 Presenter: Javier Jalle ESA DSP DAY 2016 Overview GR740 high-level description • GR740 is a new general purpose processor component for space – Developed by Cobham Gaisler with partners on STMicroelectronics C65SPACE 65nm technology platform – Development of GR740 has been supported by ESA • Newest addition to the existing Cobham LEON product portfolio (GR712, UT699, UT700) – The GR740 will work with Cobham Gaisler ecosystem: • GRMON2 • OS/Compilers • etc ... 1 14 June 2016 Cobham plc Overview GR740 high-level description • Higher computing performance and performance/watt ratio than earlier generation products – Process improvements as well as architectural improvements. • Current work is under ESA contract “NGMP Phase 2: Development of Engineering Models and radiation testing” • Development boards and prototype parts are available for purchase Already available! contact: [email protected] 2 14 June 2016 Cobham plc Overview Block diagram • Architecture block diagram 3 14 June 2016 Cobham plc Overview Block diagram • Architecture block diagram (simplified) 4 14 June 2016 Cobham plc Features summary Core components • 4 x LEON4 fault tolerant CPU:s – 16 KiB L1 instruction cache – 16 KiB L1 data cache – Memory Management Unit (MMU) – IEEE-754 Floating Point Unit (FPU) – Integer multiply and divide unit. • 2 MiB Level-2 cache – Shared between the 4 LEON4 cores 5 14 June 2016 Cobham plc Features summary Floating point unit • Each Leon4FT core comprises a a high-performance FPU – As defined in the IEEE-754 and the SPARC V8 standard (IEEE- 1754).
    [Show full text]
  • A Multicore Computing Platform for Benchmarking
    A MULTICORE COMPUTING PLATFORM FOR BENCHMARKING DYNAMIC PARTIAL RECONFIGURATION BASED DESIGNS by DAVID A. THORNDIKE Submitted in partial fulfillment of the requirements For the degree of Master of Science Thesis Advisor: Dr. Christos A. Papachristou Department of Electrical Engineering and Computer Science CASE WESTERN RESERVE UNIVERSITY August, 2012 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of David A. Thorndike candidate for the Master of Science degree *. (signed) Christos A.Papachristou (chair of the committee) Francis L. Merat Francis G. Wolff (date) June 1, 2012 *We also certify that written approval has been obtained for any proprietary material contained therein. Table of Contents List of Figures ................................................................................................................... iii List of Tables .................................................................................................................... iv Abstract .............................................................................................................................. v 1. Introduction .................................................................................................................. 1 1.1 Motivation .......................................................................................................... 1 1.2 Contributions ...................................................................................................... 2 1.3 Thesis Outline
    [Show full text]