Results 11 to 20 of about 11,256 (247)
In this paper, we introduce an interactive simulator for programs in the form of LLVM bitcode. The main features of the simulator include precise control over thread scheduling, automatic checkpoints and reverse stepping, support for source-level ...
A Groce +6 more
core +2 more sources
Mart: a mutant generation tool for LLVM [PDF]
Program mutation makes small syntactic alterations to programs' code in order to artificially create faulty programs (mutants). Mutants creation (generation) tools are often characterized by their mutation operators and the way they create and represent the mutants.
Thierry Titcheu Chekam +2 more
openalex +3 more sources
Parallel Extraction of Program Analysis Information on LLVM Based on GPU [PDF]
Low Level Virtual Machine(LLVM) Intermediate Representation(IR) contains a lot of original program analysis information.The traditional information extraction method is based on the serial loop iterations under CPU.When dealing with large-scale programs ...
MA Dongdong,ZHONG Lujie,ZHU Jingru
doaj +1 more source
Automatic Vectorization Transplant and Optimization of LLVM for Domestic Processors [PDF]
Automatic vectorization is essential in SIMD extension vectorization, and has been implemented in the LLVM compiler.However, the difference of vector length and instruction set functions can cause the domestic processors to lose the opportunity of ...
LI Jia'nan, HAN Lin, CHAI Yunda
doaj +1 more source
Description of the approach to development of the obfuscating compiler
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev +2 more
doaj +1 more source
Automatic Verification of LLVM Code
In this work we present our work in developing a software verification tool for llvm-code - Lodin - that incorporates both explicit-state model checking, statistical model checking and symbolic state model checking algorithms.
Axel Legay +2 more
openaire +2 more sources
Output-sensitive Information flow analysis [PDF]
Constant-time programming is a countermeasure to prevent cache based attacks where programs should not perform memory accesses that depend on secrets. In some cases this policy can be safely relaxed if one can prove that the program does not leak more ...
Cristian Ene +2 more
doaj +1 more source
Static analysis of energy consumption for LLVM IR programs [PDF]
Energy models can be constructed by characterizing the energy consumed by executing each instruction in a processor's instruction set. This can be used to determine how much energy is required to execute a sequence of assembly instructions, without the ...
Eder, Kerstin +5 more
core +3 more sources
Applying two-stage LLVM-based compilation approach to application deployment via cloud storage
The paper describes two-stage compilation approach for C/C++ languages that allows deploying application in the LLVM intermediate representation. The LLVM modifications for optimizing code generation time are presented as well as the developed profile ...
Sergey Gaissaryan +4 more
doaj +1 more source
Defect Detection: Combining Bounded Model Checking and Code Contracts
Bounded model checking (BMC) of C/C++ programs is a matter of scientific enquiry that attracts great attention in the last few years. In this paper, we present our approach to this problem.
Marat Akhin +2 more
doaj +3 more sources

