Results 51 to 60 of about 10,356 (199)
Implementing Obfuscating Transformations in the LLVM Compiler Infrastructure
The paper describes the methods for obfuscating C/C++ programs to prevent applying static analyzers to them. The methods are implemented within the well-known LLVM compiler infrastructure.
Victor Ivannikov +6 more
doaj +1 more source
Map2Check is a bug hunting tool that automatically checks safety properties in C programs. It tracks memory pointers and variable assignments to check user-specified assertions, overflow, and pointer safety. Here, we extend Map2Check to: (i) simplify the program using Clang/LLVM; (ii) perform a path-based symbolic execution using the KLEE tool; and ...
Rafael Menezes +3 more
openaire +1 more source
Abstract Global numerical modeling is advancing into the era of kilometer‐scale, non‐hydrostatic simulations, while heterogeneous computing emerges as a pivotal trend in high‐performance computing (HPC). As a strong candidate for next‐generation global kilometer‐scale general circulation models, the A‐grid dynamical core based on the Low Mach number ...
Weikang Zhang, Xi Chen
wiley +1 more source
SKilL is an open source system for the platform- and language-independent serialization of intermediate representations. It consists of a specification language, a binary data format and a tool for generating language bindings. The LLVM project is an open source infrastructure for the development of compilers.
openaire +2 more sources
Annotation‐Guided AoS‐to‐SoA Conversions and GPU Offloading With Data Views in C++
ABSTRACT The C++ programming language provides classes and structs as fundamental modeling entities. Consequently, C++ code tends to favor array‐of‐structs (AoS) for encoding data sequences, even though structure‐of‐arrays (SoA) yields better performance for some calculations.
Pawel K. Radtke, Tobias Weinzierl
wiley +1 more source
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit
Butler, Kevin R. B. +4 more
core +1 more source
Scanning HTML at Tens of Gigabytes Per Second on ARM Processors
ABSTRACT Background Modern processors feature Single Instruction, Multiple Data (SIMD) instructions capable of processing 16 bytes or more simultaneously, enabling significant performance enhancements in data‐intensive tasks. Two major Web browser engines (WebKit and Blink) have adopted SIMD algorithms for parsing HTML.
Daniel Lemire
wiley +1 more source
Automated Instruction Stream Throughput Prediction for Intel and AMD Microarchitectures
An accurate prediction of scheduling and execution of instruction streams is a necessary prerequisite for predicting the in-core performance behavior of throughput-bound loop kernels on out-of-order processor architectures.
Hager, Georg +4 more
core +1 more source
Analyzing control flow integrity with LLVM-CFI [PDF]
Accepted for publication at ACSAC'19 conference.
Muntean, Paul +5 more
openaire +2 more sources
A Systematic Mapping Study of the Metrics, Uses and Subjects of Diversity‐Based Testing Techniques
This paper is a systematic mapping study of diversity‐based testing (DBT) techniques that summarizes the key aspects and trends of 167 papers. The study reports the use of 79 similarity metrics with 22 types of software artefacts, which researchers have used to tackle 11 types of software testing problems.
Islam T. Elgendy +2 more
wiley +1 more source

