Results 31 to 40 of about 10,356 (199)
Loop Quasi-Invariant Chunk Motion by peeling with statement composition [PDF]
Several techniques for analysis and transformations are used in compilers. Among them, the peeling of loops for hoisting quasi-invariants can be used to optimize generated code, or simply ease developers' lives.
Moyen, Jean-Yves +2 more
core +2 more sources
Building an obfuscation compiler based on LLVM infrastructure
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS. The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin +3 more
doaj +1 more source
Intelligent intrusion detection in low power IoTs [PDF]
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali +3 more
core +1 more source
Engineering a static verification tool for GPU kernels [PDF]
We report on practical experiences over the last 2.5 years related to the engineering of GPUVerify, a static verification tool for OpenCL and CUDA GPU kernels, plotting the progress of GPUVerify from a prototype to a fully functional and relatively ...
A.F. Donaldson +13 more
core +1 more source
Dynamic compilation of SQL queries for PostgreSQL
In recent years, as performance and capacity of main and external memory grow, performance of database management systems (DBMSes) on certain kinds of queries is more determined by raw CPU speed.
R. A. Buchatskiy +5 more
doaj +1 more source
SMT-based Distributed Bounded Model Checking in Spark [PDF]
The credibility of program verification results and the verification efficiency in Satisfiablity Modulo Theories(SMT)-based bounded model checking are influenced greatly by bounds.However,the traditional serial checking method cannot validate under the ...
REN Shengbing,ZHANG Jianwei,WU Bin,WANG Zhijian
doaj +1 more source
Towards Vulnerability Discovery Using Staged Program Analysis
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean +6 more
core +1 more source
Code trolley: hardware-assisted control flow obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core
Multithread Approximation: An OpenMP Constructor
ABSTRACT This study introduces an OpenMP construct designed to simplify and unify the integration of approximate computing techniques into shared‐memory parallel programs. Approximate Computing leverages the inherent error tolerance of many applications to trade computational accuracy for gains in performance and energy efficiency.
João Briganti de Oliveira +2 more
wiley +1 more source
ThreadMonitor: Low‐Overhead Data Race Detection Using Intel Processor Trace
ABSTRACT Data races are among the most difficult multithreading bugs to find, due to their non‐deterministic nature. This and the increasing popularity of multithreaded programming have led to the need for practical automated data race detection. In this context, dynamic data race detectors have received more attention, compared to static tools, owing ...
Farzam Dorostkar +3 more
wiley +1 more source

