Results 31 to 40 of about 11,256 (247)
Compiler optimization presents a formidable challenge, seeking to enhance code quality through various techniques. One significant obstacle is the phase-ordering problem, where the sequence of optimization algorithms can impact code quality and ...
YungYu Zhuang +2 more
doaj +1 more source
Genetic Improvement of LLVM Intermediate Representation
Evolving LLVM IR is widely applicable, with LLVM Clang offering support for an increasing range of computer hardware and programming languages. Local search mutations are used to hill climb industry C code released to support geographic open standards: Open Location Code (OLC) from Google and Uber's Hexagonal Hierarchical Spatial Index (H3), giving up ...
William B. Langdon +3 more
openaire +1 more source
This paper presents the description of a possible way to build the universal linearized control flow graph which is supposed to be architecture-independent and applicable to the description of any high level language programs. The practical usefulness of
V. A. Bitner, N. V. Zaborovsky
doaj +3 more sources
Method of diversity software protection based on fusion compilation
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj +1 more source
Building an obfuscation compiler based on LLVM infrastructure
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS. The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin +3 more
doaj +1 more source
An LLVM Instrumentation Plug-in for Score-P
Reducing application runtime, scaling parallel applications to higher numbers of processes/threads, and porting applications to new hardware architectures are tasks necessary in the software development process.
Brendel, Ronny +6 more
core +1 more source
Intelligent intrusion detection in low power IoTs [PDF]
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali +3 more
core +1 more source
CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core +1 more source
Dynamic compilation of SQL queries for PostgreSQL
In recent years, as performance and capacity of main and external memory grow, performance of database management systems (DBMSes) on certain kinds of queries is more determined by raw CPU speed.
R. A. Buchatskiy +5 more
doaj +1 more source
SMT-based Distributed Bounded Model Checking in Spark [PDF]
The credibility of program verification results and the verification efficiency in Satisfiablity Modulo Theories(SMT)-based bounded model checking are influenced greatly by bounds.However,the traditional serial checking method cannot validate under the ...
REN Shengbing,ZHANG Jianwei,WU Bin,WANG Zhijian
doaj +1 more source

