Results 31 to 40 of about 11,256 (247)

The algorithm and implementation of an extension to LLVM for solving the blocking between instruction sink and division-modulo combine

open access: yesConnection Science, 2023
Compiler optimization presents a formidable challenge, seeking to enhance code quality through various techniques. One significant obstacle is the phase-ordering problem, where the sequence of optimization algorithms can impact code quality and ...
YungYu Zhuang   +2 more
doaj   +1 more source

Genetic Improvement of LLVM Intermediate Representation

open access: yes, 2023
Evolving LLVM IR is widely applicable, with LLVM Clang offering support for an increasing range of computer hardware and programming languages. Local search mutations are used to hill climb industry C code released to support geographic open standards: Open Location Code (OLC) from Google and Uber's Hexagonal Hierarchical Spatial Index (H3), giving up ...
William B. Langdon   +3 more
openaire   +1 more source

The Construction of an Universal Linearized Control Flow Graph for Static Code Analysis of Algorithms

open access: yesМоделирование и анализ информационных систем, 2013
This paper presents the description of a possible way to build the universal linearized control flow graph which is supposed to be architecture-independent and applicable to the description of any high level language programs. The practical usefulness of
V. A. Bitner, N. V. Zaborovsky
doaj   +3 more sources

Method of diversity software protection based on fusion compilation

open access: yes网络与信息安全学报, 2020
For the obvious characteristics and single mode of the existing common protection methods, with the help of the LLVM framework, a diversity software protection method based on fusion compilation was proposed.
XIONG Xiaobing, SHU Hui, KANG Fei
doaj   +1 more source

Building an obfuscation compiler based on LLVM infrastructure

open access: yesТруды Института системного программирования РАН, 2018
The paper describes the obfuscating transformations, which were implemented while developing an LLVM-based obfuscating compiler in ISP RAS.  The proposed transformations are based on well-known obfuscation algorithms and are specifically improved to ...
V. P. Korchagin   +3 more
doaj   +1 more source

An LLVM Instrumentation Plug-in for Score-P

open access: yes, 2017
Reducing application runtime, scaling parallel applications to higher numbers of processes/threads, and porting applications to new hardware architectures are tasks necessary in the software development process.
Brendel, Ronny   +6 more
core   +1 more source

Intelligent intrusion detection in low power IoTs [PDF]

open access: yes, 2016
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali   +3 more
core   +1 more source

CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]

open access: yes, 2019
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +1 more source

Dynamic compilation of SQL queries for PostgreSQL

open access: yesТруды Института системного программирования РАН, 2018
In recent years, as performance and capacity of main and external memory grow, performance of database management systems (DBMSes) on certain kinds of queries is more determined by raw CPU speed.
R. A. Buchatskiy   +5 more
doaj   +1 more source

SMT-based Distributed Bounded Model Checking in Spark [PDF]

open access: yesJisuanji gongcheng, 2017
The credibility of program verification results and the verification efficiency in Satisfiablity Modulo Theories(SMT)-based bounded model checking are influenced greatly by bounds.However,the traditional serial checking method cannot validate under the ...
REN Shengbing,ZHANG Jianwei,WU Bin,WANG Zhijian
doaj   +1 more source

Home - About - Disclaimer - Privacy