Results 51 to 60 of about 10,356 (199)

Implementing Obfuscating Transformations in the LLVM Compiler Infrastructure

open access: yesТруды Института системного программирования РАН, 2018
The paper describes the methods for obfuscating C/C++ programs to prevent applying static analyzers to them. The methods are implemented within the well-known LLVM compiler infrastructure.
Victor Ivannikov   +6 more
doaj   +1 more source

Map2Check Using LLVM and KLEE

open access: yes, 2018
Map2Check is a bug hunting tool that automatically checks safety properties in C programs. It tracks memory pointers and variable assignments to check user-specified assertions, overflow, and pointer safety. Here, we extend Map2Check to: (i) simplify the program using Clang/LLVM; (ii) perform a path-based symbolic execution using the KLEE tool; and ...
Rafael Menezes   +3 more
openaire   +1 more source

LMARSpy: A GPU‐Ready Nonhydrostatic Dynamical Core With a Sharpness‐Preserving Monotonicity Limiter and a Conservative Vertical Implicit Solver

open access: yesJournal of Advances in Modeling Earth Systems, Volume 17, Issue 10, October 2025.
Abstract Global numerical modeling is advancing into the era of kilometer‐scale, non‐hydrostatic simulations, while heterogeneous computing emerges as a pivotal trend in high‐performance computing (HPC). As a strong candidate for next‐generation global kilometer‐scale general circulation models, the A‐grid dynamical core based on the Low Mach number ...
Weikang Zhang, Xi Chen
wiley   +1 more source

Skilled LLVM

open access: yes, 2018
SKilL is an open source system for the platform- and language-independent serialization of intermediate representations. It consists of a specification language, a binary data format and a tool for generating language bindings. The LLVM project is an open source infrastructure for the development of compilers.
openaire   +2 more sources

Annotation‐Guided AoS‐to‐SoA Conversions and GPU Offloading With Data Views in C++

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 21-22, 25 September 2025.
ABSTRACT The C++ programming language provides classes and structs as fundamental modeling entities. Consequently, C++ code tends to favor array‐of‐structs (AoS) for encoding data sequences, even though structure‐of‐arrays (SoA) yields better performance for some calculations.
Pawel K. Radtke, Tobias Weinzierl
wiley   +1 more source

FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

open access: yes, 2017
The USB protocol has become ubiquitous, supporting devices from high-powered computing devices to small embedded devices and control systems. USB's greatest feature, its openness and expandability, is also its weakness, and attacks such as BadUSB exploit
Butler, Kevin R. B.   +4 more
core   +1 more source

Scanning HTML at Tens of Gigabytes Per Second on ARM Processors

open access: yesSoftware: Practice and Experience, Volume 55, Issue 7, Page 1256-1265, July 2025.
ABSTRACT Background Modern processors feature Single Instruction, Multiple Data (SIMD) instructions capable of processing 16 bytes or more simultaneously, enabling significant performance enhancements in data‐intensive tasks. Two major Web browser engines (WebKit and Blink) have adopted SIMD algorithms for parsing HTML.
Daniel Lemire
wiley   +1 more source

Automated Instruction Stream Throughput Prediction for Intel and AMD Microarchitectures

open access: yes, 2018
An accurate prediction of scheduling and execution of instruction streams is a necessary prerequisite for predicting the in-core performance behavior of throughput-bound loop kernels on out-of-order processor architectures.
Hager, Georg   +4 more
core   +1 more source

Analyzing control flow integrity with LLVM-CFI [PDF]

open access: yesProceedings of the 35th Annual Computer Security Applications Conference, 2019
Accepted for publication at ACSAC'19 conference.
Muntean, Paul   +5 more
openaire   +2 more sources

A Systematic Mapping Study of the Metrics, Uses and Subjects of Diversity‐Based Testing Techniques

open access: yesSoftware Testing, Verification and Reliability, Volume 35, Issue 2, March 2025.
This paper is a systematic mapping study of diversity‐based testing (DBT) techniques that summarizes the key aspects and trends of 167 papers. The study reports the use of 79 similarity metrics with 22 types of software artefacts, which researchers have used to tackle 11 types of software testing problems.
Islam T. Elgendy   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy