• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tan Jie, Pang Jianmin, Shan Zheng, Yue Feng, Lu Shuaibing, Dai Tao. Redundant Instruction Optimization Algorithm in Binary Translation[J]. Journal of Computer Research and Development, 2017, 54(9): 1931-1944. DOI: 10.7544/issn1000-1239.2017.20151110
Citation: Tan Jie, Pang Jianmin, Shan Zheng, Yue Feng, Lu Shuaibing, Dai Tao. Redundant Instruction Optimization Algorithm in Binary Translation[J]. Journal of Computer Research and Development, 2017, 54(9): 1931-1944. DOI: 10.7544/issn1000-1239.2017.20151110

Redundant Instruction Optimization Algorithm in Binary Translation

More Information
  • Published Date: August 31, 2017
  • Binary translation is a main method to implement software migration. Dynamic binary translation is limited by dynamic execution and cannot be deeply optimized, resulting in low efficiency. Traditional static binary translation has difficulty to deal with indirect branch, and conventional optimization methods mostly affect in the intermediate code layer, paying less attention to a large number of redundant instructions that exist in the target code. According to this situation, this paper presents a static binary translation framework SQEMU and a target code optimization algorithm to delete redundant instructions based on the framework. The algorithm generates an instruction-specific data dependence graph(IDDG) based on the analysis of target codes, then combines liveness analysis with peephole optimization using IDDG, and effectively removes redundant instructions in target codes. Experimental results show that using the optimization algorithm for target codes, the execution efficiency is significantly increased, the maximal increase up to 42%, and the overall performance test shows that the optimized translation efficiency of nbench is increased by about 20% on average, and it is increased about 17% of SPEC CINT2006 on average.
  • Related Articles

    [1]Tang Chenghua, Cai Weijia, Yang Mengmeng, Qiang Baohua. CBFuzzer: Fuzzy Detection of Program Defects Based on Execution Context Orientation and Protection Breakthrough[J]. Journal of Computer Research and Development, 2025, 62(3): 790-807. DOI: 10.7544/issn1000-1239.202330755
    [2]Xiong Xin, Tan Xin, Zhang Yuan. Kernel Refcount Bug Detection Based on the Consistency of Error Path Behavior[J]. Journal of Computer Research and Development, 2023, 60(7): 1489-1500. DOI: 10.7544/issn1000-1239.202220768
    [3]Yu Tingting, Li Chao, Wang Boxiang, Chen Rui, Jiang Yunsong. Atomicity Violation Detection for Interrupt-Driven Aerospace Embedded Software[J]. Journal of Computer Research and Development, 2023, 60(2): 294-310. DOI: 10.7544/issn1000-1239.202220908
    [4]Yu Zhen, Su Xiaohong, Qi Peng, Ma Peijun. Deadlock Avoiding Based on Future Lockset[J]. Journal of Computer Research and Development, 2017, 54(2): 428-445. DOI: 10.7544/issn1000-1239.2017.20150701
    [5]Li Qingyong, Liang Zhengping, Huang Yaping, Shi Zhongzhi. Sparseness Representation Model for Defect Detection and Its Application[J]. Journal of Computer Research and Development, 2014, 51(9): 1929-1935. DOI: 10.7544/issn1000-1239.2014.20140153
    [6]Wang Hailong, Gong Zhenghu, and Hou Jie. Overview of Botnet Detection[J]. Journal of Computer Research and Development, 2010, 47(12).
    [7]Zhao Jia, Han Jun, Zeng Xiaoyang, and Han Lin. A Two-Dimensional Parity-Based Concurrent Error Detection Method for AES Against Differential Fault Attack and Its VLSI Implementation[J]. Journal of Computer Research and Development, 2009, 46(4): 593-601.
    [8]Cheng Xin, Liu Hongwei, Dong Jian, Yang Xiaozong. A Fault Tolerance Deadlock Detection/Resolution Algorithm for the AND-OR Model[J]. Journal of Computer Research and Development, 2007, 44(5): 798-805.
    [9]Wang Zhaofei and Huang Chun. Static Detection of Deadlocks in OpenMP Fortran Programs[J]. Journal of Computer Research and Development, 2007, 44(3).
    [10]Zhao Jing, Liu Hongwei, Cui Gang, and Yang Xiaozong. A Software Reliability Growth Model Considering Differences Between Testing and Operation[J]. Journal of Computer Research and Development, 2006, 43(3): 503-508.

Catalog

    Article views (1326) PDF downloads (611) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return