Filters








21,126 Hits in 5.9 sec

Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study [chapter]

Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere
2013 Lecture Notes in Computer Science  
We present a feasibility study to protect smart card software against fault-injection attacks by means of binary code rewriting.  ...  We implemented a range of protection techniques in a link-time rewriter and evaluate and discuss the obtained coverage, the associated overhead and engineering effort, as well as its practical usability  ...  First, inserting redundancy involves static as well as dynamic code duplication: In Figure 2 , the load occurs twice in the code statically and it will be executed twice dynamically.  ... 
doi:10.1007/978-3-642-39884-1_19 fatcat:2gkj6xepwjb6flmyqvmvr2s2zi

Enhancing Dynamic Binary Translation in Mobile Computing by Leveraging Polyhedral Optimization

Mingliang Li, Jianmin Pang, Feng Yue, Fudong Liu, Jun Wang, Jie Tan, Shaohua Wan
2021 Wireless Communications and Mobile Computing  
Dynamic binary translation (DBT) is gaining importance in mobile computing.  ...  For that, we propose LLPEMU, a DBT framework that combines binary translation with polyhedral optimization.  ...  Acknowledgments This research is supported in part by the National Natural Science Foundation of China under Grant 61472447, Grant 61802433, and Grant 61802435.  ... 
doi:10.1155/2021/6611867 fatcat:c7prlqpthvdybmp4hiq3nwvssm

Techniques and tools for dynamic optimization

J.D. Hiser, N. Kumar, Min Zhao, Shukang Zhou, B.R. Childers, J.W. Davidson, M.L. Soffa
2006 Proceedings 20th IEEE International Parallel & Distributed Processing Symposium  
We discuss other fundamental issues in developing a dynamic optimizer and finally present a basic debugger for SDT systems.  ...  In this paper, we describe our efforts in reducing overhead in SDT and efficient techniques for instrumenting the application code.  ...  Native-to-native optimization accepts a native code segment as input.  ... 
doi:10.1109/ipdps.2006.1639569 dblp:conf/ipps/HiserKZZCDS06 fatcat:pvzjpfk5sze5bce2takbu2x63y

Finding errors in multithreaded GUI applications

Sai Zhang, Hao Lü, Michael D. Ernst
2012 Proceedings of the 2012 International Symposium on Software Testing and Analysis - ISSTA 2012  
This paper presents a general technique to find such invalid thread access errors in multithreaded GUI applications.  ...  background, such as expensive computation, I/O tasks, and network requests.  ...  ACKNOWLEDGEMENTS We thank Stephen Fink and Manu Sridharan for answering our questions about WALA. This work was supported in part by ABB Corporation and NSF grant CCF-1016701.  ... 
doi:10.1145/2338965.2336782 dblp:conf/issta/ZhangLE12 fatcat:n2yy2jjnkvexdbps5emvu4o4ea

Toddler: Detecting performance problems via similar memory-access patterns

Adrian Nistor, Linhai Song, Darko Marinov, Shan Lu
2013 2013 35th International Conference on Software Engineering (ICSE)  
Our experiments with 11 previously known, real-world performance bugs show that TODDLER finds these bugs with a higher accuracy than the standard Java profiler.  ...  TODDLER reports code loops whose computation has repetitive and partially similar memory-access patterns across loop iterations. Such repetitive work is likely unnecessary and can be done faster.  ...  CCF-1054616, CNS-0958199, and CCF-0746856; and a Clare Boothe Luce faculty fellowship.  ... 
doi:10.1109/icse.2013.6606602 dblp:conf/icse/NistorSML13 fatcat:prc2qjawijfebaojv7iin4efay

Redundant Loads: A Software Inefficiency Indicator [article]

Pengfei Su, Shasha Wen, Hailong Yang, Milind Chabbi, Xu Liu
2019 arXiv   pre-print
Redundant operations are a common performance limiter in these code bases.  ...  LoadSpy works on fully optimized binaries, adopts various optimization techniques to reduce its overhead, and provides a rich graphic user interface, which make it a complete developer tool.  ...  ACKNOWLEDGMENT We thank reviewers for their valuable comments. This work is supported by Google Faculty Research Award and National Natural Science Foundation of China (No. 61502019).  ... 
arXiv:1902.05462v1 fatcat:uu3c2jsyffeuxgvojyytalhdhe

LT Network Codes

Mary-Luc Champel, Kévin Huguenin, Anne-Marie Kermarrec, Nicolas Le Scouarnec
2010 2010 IEEE 30th International Conference on Distributed Computing Systems  
In this paper, we propose a novel network coding approach based on LT codes, initially introduced in the context of erasure coding.  ...  Network coding has been successfully applied in large-scale content dissemination systems. While network codes provide optimal throughput, its current forms suffer from a high decoding complexity.  ...  Algorithm 3 gives a pseudo-code version of the redundancy detection mechanism used in LTNC.  ... 
doi:10.1109/icdcs.2010.14 dblp:conf/icdcs/ChampelHKS10 fatcat:hzbw3grlhvb6xdyz42c657sxbm

Dynamo

Vasanth Bala, Evelyn Duesterwald, Sanjeev Banerjia
2000 Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation - PLDI '00  
The input native instruction stream to Dynamo can be dynamically generated (by a JIT for example), or it can come from the execution of a statically compiled native binary.  ...  We describe the design and implementation of Dynamo, a software dynamic optimization system that is capable of transparently improving the performance of a native instruction stream as it executes on the  ...  Finally, we are grateful to Josh Fisher and Dick Lampman for their encouragement and support of this project. References  ... 
doi:10.1145/349299.349303 dblp:conf/pldi/BalaDB00 fatcat:7hgf5dnekvdrzh3edxibpajagy

Dynamo

Vasanth Bala, Evelyn Duesterwald, Sanjeev Banerjia
2000 SIGPLAN notices  
The input native instruction stream to Dynamo can be dynamically generated (by a JIT for example), or it can come from the execution of a statically compiled native binary.  ...  We describe the design and implementation of Dynamo, a software dynamic optimization system that is capable of transparently improving the performance of a native instruction stream as it executes on the  ...  Finally, we are grateful to Josh Fisher and Dick Lampman for their encouragement and support of this project. References  ... 
doi:10.1145/358438.349303 fatcat:ftwakx6cbrh5jku3nmoc377utq

Analysis of Obfuscated Code with Program Slicing

Mahin Talukder, Syed Islam, Paolo Falcarin
2019 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)  
However, it is possible to reverse engineer obfuscated code with time, determination and the right tools.  ...  In general, there is no accepted methodology to determine the strength of obfuscated code; however resilience is often considered a good metric as it indicates the percentage of obfuscated code that cannot  ...  tools, and it clearly depends by the type of tool and the target language, e.g.: interpreted or compiled code, bytecode or native code.  ... 
doi:10.1109/cybersecpods.2019.8885094 dblp:conf/cybersecpods/TalukderIF19 fatcat:tisjl37c2ba4ra3o6fawfcv27q

Barrier elision for production parallel programs

Milind Chabbi, Wim Lavrijsen, Wibe de Jong, Koushik Sen, John Mellor-Crummey, Costin Iancu
2015 SIGPLAN notices  
We apply our techniques to NWChem-a 6 million line computational chemistry code written in C/C++/Fortran that uses several runtime libraries such as Global Arrays, ComEx, DMAPP, and MPI.  ...  In this paper, we present context-sensitive dynamic optimizations that elide barriers redundant during the program execution.  ...  Acknowledgments Support for this work was provided in part through the X-Stack program funded by the U.S.  ... 
doi:10.1145/2858788.2688502 fatcat:ijdxemwqcvfefihilzvif3hyn4

Barrier elision for production parallel programs

Milind Chabbi, Wim Lavrijsen, Wibe de Jong, Koushik Sen, John Mellor-Crummey, Costin Iancu
2015 Proceedings of the 20th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming - PPoPP 2015  
We apply our techniques to NWChem-a 6 million line computational chemistry code written in C/C++/Fortran that uses several runtime libraries such as Global Arrays, ComEx, DMAPP, and MPI.  ...  In this paper, we present context-sensitive dynamic optimizations that elide barriers redundant during the program execution.  ...  Acknowledgments Support for this work was provided in part through the X-Stack program funded by the U.S.  ... 
doi:10.1145/2688500.2688502 dblp:conf/ppopp/ChabbiLJSMI15 fatcat:u64m4ekyhzhdlimzujxenrj47q

TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting

W. Cheng, Qin Zhao, Bei Yu, S. Hiroshige
2006 11th IEEE Symposium on Computers and Communications (ISCC'06)  
In this paper, we demonstrate that TaintTrace is effective in protecting against various attacks while maintaining a modest slowdown of 5.5 times, offering significant improvements over similar tools.  ...  The challenge lies in minimizing the run-time overhead of the tool. TaintTrace uses a number of techniques such as direct memory mapping to optimize performance.  ...  Twolf with test input is the exception because its native execution is already very fast, using only about 0.4s, in which case our tracing tool spent a large portion of time in initialization (about 80%  ... 
doi:10.1109/iscc.2006.158 dblp:conf/iscc/ChengZYH06 fatcat:z6mblqc2rrhatgm2uwxdy74sw4

Morpheus

Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu
2014 Proceedings of the 30th Annual Computer Security Applications Conference on - ACSAC '14  
., NDSS'10] -Dynamic external code loading [Poeplau et al., NDSS'14] True  emulators; False  real devices -IMEI hardcoded in the emulated baseband • Analyze the DAC and MAC policies to find artifacts  ...  forests to • Generate a score for each candidate red pill • Remove redundant red pills • Experimental setup -3 sources of observable artifacts • Files: /proc and /sys • Android APIs that have  ... 
doi:10.1145/2664243.2664250 dblp:conf/acsac/JingZAH14 fatcat:mi6dcuqodjd73fy3y5n3uignw4

Robust Communication Protocol Over Lossy Network

Kaustubh Chandorkar, Gajendra Dhaytadak, Siddhant Negi, Subodh Karve
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
A sliding window version of RLNC is proposed where the coded packets are generated using packets in a window size and are inserted among systematic packets in different paths.  ...  A computer network is the infrastructure that allows two or more computers (called hosts) to communicate with each other.  ...  Other built-in tools include a code profiler, designer for building GUI applications, web designer, class designer, and database schema designer.  ... 
doi:10.32628/cseit206360 fatcat:bkpelz66pja7pfpcgqw2dyqpvu
« Previous Showing results 1 — 15 out of 21,126 results