Results 11 to 20 of about 10,440 (199)
Termination-checking for LLVM peephole optimizations [PDF]
Mainstream compilers contain a large number of peephole optimizations, which perform algebraic simplification of the input program with local rewriting of the code. These optimizations are a persistent source of bugs. Our recent research on Alive, a domainspecific language for expressing peephole optimizations in LLVM, addresses a part of the problem ...
Nagarakatte, Santosh, Menendez, David
openaire +1 more source
Description of the approach to development of the obfuscating compiler
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev +2 more
doaj +1 more source
Output-sensitive Information flow analysis [PDF]
Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more ...
Cristian Ene +2 more
doaj +1 more source
Static analysis of energy consumption for LLVM IR programs [PDF]
Energy models can be constructed by characterizing the energy consumed by executing each instruction in a processor's instruction set. This can be used to determine how much energy is required to execute a sequence of assembly instructions, without the ...
Eder, Kerstin +5 more
core +3 more sources
Lost in translation: Exposing hidden compiler optimization opportunities [PDF]
Existing iterative compilation and machine-learning-based optimization techniques have been proven very successful in achieving better optimizations than the standard optimization levels of a compiler.
Chamski, Zbigniew +4 more
core +3 more sources
Applying two-stage LLVM-based compilation approach to application deployment via cloud storage
The paper describes two-stage compilation approach for C/C++ languages that allows deploying application in the LLVM intermediate representation. The LLVM modifications for optimizing code generation time are presented as well as the developed profile ...
Sergey Gaissaryan +4 more
doaj +1 more source
Defect Detection: Combining Bounded Model Checking and Code Contracts
Bounded model checking (BMC) of C/C++ programs is a matter of scientific enquiry that attracts great attention in the last few years. In this paper, we present our approach to this problem.
Marat Akhin +2 more
doaj +3 more sources
Automatic C Program Verification Based on Mixed Axiomatic Semantics
The development of the C-light project resulted in the application of new formalisms and implementation techniques which facilitate the verification process.
I. V. Maryasov +3 more
doaj +3 more sources
Genetic Improvement of LLVM Intermediate Representation
Evolving LLVM IR is widely applicable, with LLVM Clang offering support for an increasing range of computer hardware and programming languages. Local search mutations are used to hill climb industry C code released to support geographic open standards: Open Location Code (OLC) from Google and Uber's Hexagonal Hierarchical Spatial Index (H3), giving up ...
Langdon, William +3 more
openaire +1 more source
Enhancing R with Advanced Compilation Tools and Methods [PDF]
I describe an approach to compiling common idioms in R code directly to native machine code and illustrate it with several examples. Not only can this yield significant performance gains, but it allows us to use new approaches to computing in R ...
Lang, Duncan Temple
core +1 more source

