Results 31 to 40 of about 10,440 (199)
Intelligent intrusion detection in low power IoTs [PDF]
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali +3 more
core +1 more source
Building an obfuscation compiler based on LLVM infrastructure
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS. The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin +3 more
doaj +1 more source
Towards Vulnerability Discovery Using Staged Program Analysis
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean +6 more
core +1 more source
Engineering a static verification tool for GPU kernels [PDF]
We report on practical experiences over the last 2.5 years related to the engineering of GPUVerify, a static verification tool for OpenCL and CUDA GPU kernels, plotting the progress of GPUVerify from a prototype to a fully functional and relatively ...
A.F. Donaldson +13 more
core +1 more source
Dynamic compilation of SQL queries for PostgreSQL
In recent years, as performance and capacity of main and external memory grow, performance of database management systems (DBMSes) on certain kinds of queries is more determined by raw CPU speed.
R. A. Buchatskiy +5 more
doaj +1 more source
SMT-based Distributed Bounded Model Checking in Spark [PDF]
The credibility of program verification results and the verification efficiency in Satisfiablity Modulo Theories(SMT)-based bounded model checking are influenced greatly by bounds.However,the traditional serial checking method cannot validate under the ...
REN Shengbing,ZHANG Jianwei,WU Bin,WANG Zhijian
doaj +1 more source
Converting Binary Floating‐Point Numbers to Shortest Decimal Strings: An Experimental Review
ABSTRACT Background When sharing or logging numerical data, we must convert binary floating‐point numbers into their decimal string representations. For example, the number π might become 3.1415927. Engineers have perfected many algorithms for producing such accurate, short strings.
Jaël Champagne Gareau, Daniel Lemire
wiley +1 more source
Implementing implicit OpenMP data sharing on GPUs
OpenMP is a shared memory programming model which supports the offloading of target regions to accelerators such as NVIDIA GPUs. The implementation in Clang/LLVM aims to deliver a generic GPU compilation toolchain that supports both the native CUDA C/C++
Bataev, Alexey +8 more
core +1 more source
Code trolley: hardware-assisted control flow obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core
ABSTRACT We discuss the development of the package repository of CRAN, its design principles and how these are put into practice. We provide insights into how the regular and submission checks are organised and the actions resulting from these checks.
Kurt Hornik, Uwe Ligges
wiley +1 more source

