A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study
[chapter]
2013
Lecture Notes in Computer Science
We present a feasibility study to protect smart card software against fault-injection attacks by means of binary code rewriting. ...
We implemented a range of protection techniques in a link-time rewriter and evaluate and discuss the obtained coverage, the associated overhead and engineering effort, as well as its practical usability ...
First, inserting redundancy involves static as well as dynamic code duplication: In Figure 2 , the load occurs twice in the code statically and it will be executed twice dynamically. ...
doi:10.1007/978-3-642-39884-1_19
fatcat:2gkj6xepwjb6flmyqvmvr2s2zi
Enhancing Dynamic Binary Translation in Mobile Computing by Leveraging Polyhedral Optimization
2021
Wireless Communications and Mobile Computing
Dynamic binary translation (DBT) is gaining importance in mobile computing. ...
For that, we propose LLPEMU, a DBT framework that combines binary translation with polyhedral optimization. ...
Acknowledgments This research is supported in part by the National Natural Science Foundation of China under Grant 61472447, Grant 61802433, and Grant 61802435. ...
doi:10.1155/2021/6611867
fatcat:c7prlqpthvdybmp4hiq3nwvssm
Techniques and tools for dynamic optimization
2006
Proceedings 20th IEEE International Parallel & Distributed Processing Symposium
We discuss other fundamental issues in developing a dynamic optimizer and finally present a basic debugger for SDT systems. ...
In this paper, we describe our efforts in reducing overhead in SDT and efficient techniques for instrumenting the application code. ...
Native-to-native optimization accepts a native code segment as input. ...
doi:10.1109/ipdps.2006.1639569
dblp:conf/ipps/HiserKZZCDS06
fatcat:pvzjpfk5sze5bce2takbu2x63y
Finding errors in multithreaded GUI applications
2012
Proceedings of the 2012 International Symposium on Software Testing and Analysis - ISSTA 2012
This paper presents a general technique to find such invalid thread access errors in multithreaded GUI applications. ...
background, such as expensive computation, I/O tasks, and network requests. ...
ACKNOWLEDGEMENTS We thank Stephen Fink and Manu Sridharan for answering our questions about WALA. This work was supported in part by ABB Corporation and NSF grant CCF-1016701. ...
doi:10.1145/2338965.2336782
dblp:conf/issta/ZhangLE12
fatcat:n2yy2jjnkvexdbps5emvu4o4ea
Toddler: Detecting performance problems via similar memory-access patterns
2013
2013 35th International Conference on Software Engineering (ICSE)
Our experiments with 11 previously known, real-world performance bugs show that TODDLER finds these bugs with a higher accuracy than the standard Java profiler. ...
TODDLER reports code loops whose computation has repetitive and partially similar memory-access patterns across loop iterations. Such repetitive work is likely unnecessary and can be done faster. ...
CCF-1054616, CNS-0958199, and CCF-0746856; and a Clare Boothe Luce faculty fellowship. ...
doi:10.1109/icse.2013.6606602
dblp:conf/icse/NistorSML13
fatcat:prc2qjawijfebaojv7iin4efay
Redundant Loads: A Software Inefficiency Indicator
[article]
2019
arXiv
pre-print
Redundant operations are a common performance limiter in these code bases. ...
LoadSpy works on fully optimized binaries, adopts various optimization techniques to reduce its overhead, and provides a rich graphic user interface, which make it a complete developer tool. ...
ACKNOWLEDGMENT We thank reviewers for their valuable comments. This work is supported by Google Faculty Research Award and National Natural Science Foundation of China (No. 61502019). ...
arXiv:1902.05462v1
fatcat:uu3c2jsyffeuxgvojyytalhdhe
LT Network Codes
2010
2010 IEEE 30th International Conference on Distributed Computing Systems
In this paper, we propose a novel network coding approach based on LT codes, initially introduced in the context of erasure coding. ...
Network coding has been successfully applied in large-scale content dissemination systems. While network codes provide optimal throughput, its current forms suffer from a high decoding complexity. ...
Algorithm 3 gives a pseudo-code version of the redundancy detection mechanism used in LTNC. ...
doi:10.1109/icdcs.2010.14
dblp:conf/icdcs/ChampelHKS10
fatcat:hzbw3grlhvb6xdyz42c657sxbm
Dynamo
2000
Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation - PLDI '00
The input native instruction stream to Dynamo can be dynamically generated (by a JIT for example), or it can come from the execution of a statically compiled native binary. ...
We describe the design and implementation of Dynamo, a software dynamic optimization system that is capable of transparently improving the performance of a native instruction stream as it executes on the ...
Finally, we are grateful to Josh Fisher and Dick Lampman for their encouragement and support of this project.
References ...
doi:10.1145/349299.349303
dblp:conf/pldi/BalaDB00
fatcat:7hgf5dnekvdrzh3edxibpajagy
Dynamo
2000
SIGPLAN notices
The input native instruction stream to Dynamo can be dynamically generated (by a JIT for example), or it can come from the execution of a statically compiled native binary. ...
We describe the design and implementation of Dynamo, a software dynamic optimization system that is capable of transparently improving the performance of a native instruction stream as it executes on the ...
Finally, we are grateful to Josh Fisher and Dick Lampman for their encouragement and support of this project.
References ...
doi:10.1145/358438.349303
fatcat:ftwakx6cbrh5jku3nmoc377utq
Analysis of Obfuscated Code with Program Slicing
2019
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
However, it is possible to reverse engineer obfuscated code with time, determination and the right tools. ...
In general, there is no accepted methodology to determine the strength of obfuscated code; however resilience is often considered a good metric as it indicates the percentage of obfuscated code that cannot ...
tools, and it clearly depends by the type of tool and the target language, e.g.: interpreted or compiled code, bytecode or native code. ...
doi:10.1109/cybersecpods.2019.8885094
dblp:conf/cybersecpods/TalukderIF19
fatcat:tisjl37c2ba4ra3o6fawfcv27q
Barrier elision for production parallel programs
2015
SIGPLAN notices
We apply our techniques to NWChem-a 6 million line computational chemistry code written in C/C++/Fortran that uses several runtime libraries such as Global Arrays, ComEx, DMAPP, and MPI. ...
In this paper, we present context-sensitive dynamic optimizations that elide barriers redundant during the program execution. ...
Acknowledgments Support for this work was provided in part through the X-Stack program funded by the U.S. ...
doi:10.1145/2858788.2688502
fatcat:ijdxemwqcvfefihilzvif3hyn4
Barrier elision for production parallel programs
2015
Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming - PPoPP 2015
We apply our techniques to NWChem-a 6 million line computational chemistry code written in C/C++/Fortran that uses several runtime libraries such as Global Arrays, ComEx, DMAPP, and MPI. ...
In this paper, we present context-sensitive dynamic optimizations that elide barriers redundant during the program execution. ...
Acknowledgments Support for this work was provided in part through the X-Stack program funded by the U.S. ...
doi:10.1145/2688500.2688502
dblp:conf/ppopp/ChabbiLJSMI15
fatcat:u64m4ekyhzhdlimzujxenrj47q
TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting
2006
11th IEEE Symposium on Computers and Communications (ISCC'06)
In this paper, we demonstrate that TaintTrace is effective in protecting against various attacks while maintaining a modest slowdown of 5.5 times, offering significant improvements over similar tools. ...
The challenge lies in minimizing the run-time overhead of the tool. TaintTrace uses a number of techniques such as direct memory mapping to optimize performance. ...
Twolf with test input is the exception because its native execution is already very fast, using only about 0.4s, in which case our tracing tool spent a large portion of time in initialization (about 80% ...
doi:10.1109/iscc.2006.158
dblp:conf/iscc/ChengZYH06
fatcat:z6mblqc2rrhatgm2uwxdy74sw4
Morpheus
2014
Proceedings of the 30th Annual Computer Security Applications Conference on - ACSAC '14
., NDSS'10] -Dynamic external code loading [Poeplau et al., NDSS'14] True emulators; False real devices -IMEI hardcoded in the emulated baseband • Analyze the DAC and MAC policies to find artifacts ...
forests to
• Generate a score for each candidate red pill
• Remove redundant red pills
• Experimental setup
-3 sources of observable artifacts
• Files: /proc and /sys
• Android APIs that have ...
doi:10.1145/2664243.2664250
dblp:conf/acsac/JingZAH14
fatcat:mi6dcuqodjd73fy3y5n3uignw4
Robust Communication Protocol Over Lossy Network
2020
International Journal of Scientific Research in Computer Science Engineering and Information Technology
A sliding window version of RLNC is proposed where the coded packets are generated using packets in a window size and are inserted among systematic packets in different paths. ...
A computer network is the infrastructure that allows two or more computers (called hosts) to communicate with each other. ...
Other built-in tools include
a code profiler, designer for building GUI applications,
web designer, class designer, and database schema
designer. ...
doi:10.32628/cseit206360
fatcat:bkpelz66pja7pfpcgqw2dyqpvu
« Previous
Showing results 1 — 15 out of 21,126 results