Formal requirements for virtualizable third generation architectures

@inproceedings{Popek1973FormalRF,
  title={Formal requirements for virtualizable third generation architectures},
  author={Gerald J. Popek and Robert P. Goldberg},
  booktitle={CACM},
  year={1973}
}
Virtual machine systems have been implemented on a limited number of third generation computer systems, e.g. CP-67 on the IBM 360/67. From previous empirical studies, it is known that certain third generation computer systems, e.g. the DEC PDP-10, cannot support a virtual machine system. In this paper, model of a third-generation-like computer system is developed. Formal techniques are used to derive precise sufficient conditions to test whether such an architecture can support virtual machines… 

Figures from this paper

Extension to the Model of a Virtualizable Computer and Analysis on the Efficiency of a Virtual Machine
  • H. Dong, Qinfen Hao
  • Computer Science
    2010 Second International Conference on Computer Modeling and Simulation
  • 2010
TLDR
An extended model for a modern computer architecture is proposed and the correctness of the theorem for virtualizability on the level of ISA via this model is proved and some discussions are made about the efficiency of applications executed in a virtual machine from two different aspects: the instruction stream and the physical machine's resource management.
Formal properties of recursive Virtual Machine architectures.
A formal model of hardware/software architectures is developed and applied to Virtual Machine Systems. Results are derived on the sufficient conditions that a machine architecture must verify in
Testing system virtual machines
TLDR
This paper presents a methodology specific for testing system virtual machines, based on protocol-specific fuzzing and differential analysis, and consists in forcing a virtual machine and the corresponding physical machine to execute specially crafted snippets of user- and system-mode code and in comparing their behaviors.
The PDP-11 virtual machine architecture: A case study
At UCLA, a virtual machine system prototype has been constructed for the Digital Equipment Corporation PDP-11/45. In order to successfully implement that system, a number of hardware changes have
Virtual Machines Technologies
In 1974th Gerald J. Popek and Robert P. Goldberg in “Formal Requirements for Virtualizable Third Generation” 1 have introduced the term of Virtual Machine. In computer science, a virtual machine (VM)
Software debugging: the virtual machine approach
TLDR
A number of more powerful debugging tools have been combined with VMs to yield more flexible debugging systems, and real console functions have proved inadequate for VMs.
Survey of virtual machine research
The complete instruction-by-instruction simulation of one computer system on a different system is a well-known computing technique. It is often used for software development when a hardware base is
Design and implementation of a distributed virtual machine for networked computers
TLDR
This paper describes the motivation, architecture and performance of a distributed virtual machine (DVM) for networked computers that implements the Java virtual machine, runs on x86 and DEC Alpha processors and supports existing Java-enabled clients.
An implementation scheme for a virtual machine monitor to be realized on user - microprogrammable minicomputers
TLDR
This paper presents the description of a virtual machine monitor and its support structure which can be implemented on a microprogrammable minicomputer or a distributed network of such machines.
Sharing data and services in a virtual machine system
Experimental additions have been made to a conventional virtual machine system (VM/370) in order to support a centralized program library management service for a group of interdependent users. These
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 31 REFERENCES
Architectural Principles for Virtual Computer Systems
TLDR
The model of a process running on a virtual computer system (VCS) and the derivation of design principles from that model allows us to understand different properties of virtual machines and to interpret a number of proposed implementations of VCS's in terms of the model.
PDP-10 virtual machines
TLDR
The author has easily constructed a prototype virtual machine using a simulator and an operating system with hierarchical process relationships to construct a “hybrid” virtual machine.
A POSTMORTEM FOR A TIME SHARING SYSTEM
TLDR
This thesis includes software and hardware proposals to increase the efficiency of representing an abstract machine and providing capability based protection and a description of a crash recovery consistency problem for files which reside in several levels of storage, together with a solution that was used.
The evolution of virtual machine architecture
In the early 1960's two major evolutionary steps were taken with regard to computing systems architecture. These were the emergence of I/O processors and the use of multiprogramming to improve
A Virtual Machine Time-Sharing System
TLDR
The design objectives of CP-67/CMS are described, a multi-access system that manages the resources of a computer set up for time-sharing such that each user appears to have a complete, dedicated computer at his disposal.
A recursive virtual machine architecture
This paper summarizes the preliminary design of a computer system with a recursive, virtual machine architecture and gives a brief account of the considerations leading to that design . In this
HYDRA: the kernel of a multiprocessor operating system
This paper describes the design philosophy of HYDRA—the kernel of an operating system for C.mmp, the Carnegie-Mellon Multi-Mini-Processor. This philosophy is realized through the introduction of a
On The Advantages of Tagged Architecture
  • E. Feustel
  • Computer Science
    IEEE Transactions on Computers
  • 1973
TLDR
The paper shows that the advantages of the change from the traditional von Neumann machine to tagged architecture are seen in all software areas including programming systems, operating systems, debugging systems, and systems of software instrumentation.
Dynamic protection structures
TLDR
This paper deals with one aspect of the subject, which might be called the meta-theory of protection systems: how can the information which specifies protection and authorizes access, itself be protected and manipulated.
COOPERATION OF MUTUALLY SUSPICIOUS SUBSYSTEMS IN A COMPUTER UTILITY
TLDR
Practical protection mechanisms that allow mutually suspicious subsystems to cooperate in a single computation and still be protected from one another are described.
...
1
2
3
4
...