proposed, currently there is no well-established sce-
nario for real applications using such kind of software
architecture. One application of Secure Pager is to
protect a monitoring service that detects rootkits for
Linux. By means of Secure Pager, it could avoid ma-
licious access from Linux to the memory image of the
monitoring service. In spite of the case, we are look-
ing forward to have more applications to exploit this
feature.
REFERENCES
Kanda, W., Yumura, Y., Kinebuchi, Y., Makijima, K. and
Nakajima, T.. (2008). SPUMONE: Lightweight CPU
Virtualization Layer for Embedded Systems. Em-
bedded and Ubiquitous Computing, 2008. EUC ’08.
IEEE/IFIP International Conference, vol. 1, pp. 144-
151.
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.,
Ho, A., Neugebauery, R., Pratt, I. and Warfield, A.
(2003). Xen and the Art of Virtualization. SOSP.
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K.,
Hasegawa, S., Horie, T., Hirano, M., Kourai, K.,
Oyama, Y., Kawai, E., Kono, K., Chiba, S., Shinjo,
Y., Kato, K. (2009). BitVisor: A Thin Hypervisor for
Enforcing I/O Device Security. VEE.
Seshadri, A., Luk, M. and Qu, N. and Perrig, A. (2007).
SecVisor: a tiny hypervisor to provide lifetime kernel
code integrity for commodity OSes. SIGOPS Oper.
Syst.
Advanced Micro Devices. (2011). AMD64 Architecture
Programmer’s Manual Volume 2: System Program-
ming, 3.19 edition.
Sangorrin, D., Honda, S. and Takada, H.. (2010). Dual Op-
erating System Architecture for Real-Time Embedded
Systems. OSPERT.
Alves, T. and Felton, D. ARM. (2004). TrustZone: Inte-
grated Hardware and Software Security. Information
Quarterly Volume 3.
Banakar, R., Steinke, S., Lee, B.-S., Balakrishnan, M. and
Marwedel, P. (2002) Scratchpad Memory : A Design
Alternative for Cache On-chip memory in Embedded
Systems. CODES.
Held, J. (2010) Single-chip Cloud Com-
puter: An experimental many-core pro-
cessor from Intel Labs. Retrieved from:
http://communities.intel.com/servlet/JiveServlet/dow
nloadBody/5074-102-1-8131/SCC
Sympossium Feb
212010
FINAL-A.pdf. Intel Labs Single-chip Cloud
Computer Symposium.
Shimizu, K., Hofstee, H. P. and Liberty, J. S. (2007). Cell
Broadband Engine processor vault security architec-
ture. IBM Journal of Research and Development, Vol-
ume 51 Issue 5, 521-528.
Kinebuchi, Y., Nakajima, T., Ganapathy, V. and Iftode,
L. (2010) Core-Local Memory Assisted Protection.
Pacific Rim International Symposium on Dependable
Computing, IEEE, pp. 233-234.
TOPPRES Project. (2004). TOPPERS/JSP
Kernel USER’S MANUAL. Retrieved
from: http://www.ydktec.com/az/document/
AZ9360SDK
TOPPERS UM.pdf
Ito, M., Hattori, T., Yoshida, Y., Hayase, K., Hayashi,
T., Nishii, O., Yasu, Y., Hasegawa, A., Takada, M.,
Mizuno, H., Uchiyama, K., Odaka, T., Shirako, J.,
Mase, M., Kimura, K. and Kasahara, H. (2008). An
8640 MIPS SoC with Independent Power-Off Control
of 8 CPUs and 8 RAMs by An Automatic Paralleliz-
ing Compiler. Solid-State Circuits Conference, 2008.
ISSCC 2008. Digest of Technical Papers. IEEE Inter-
national, 90-598.
Express Logic, Inc. Thread-Metric Benchmark Suite. Re-
trieved from: http://rtos.com/PDFs/
MeasuringRTOSPerformance.pdf
Yanmin (2008). hackbench. Retrieved from: http://people.
redhat.com/mingo/cfs-scheduler/tools/hackbench.c
SPATIAL ISOLATION ON REALTIME HYPERVISOR USING CORE-LOCAL MEMORY
421