Filters








4,423 Hits in 5.9 sec

Fast as a shadow, expressive as a tree

Arvid Jakobsson, Nikolai Kosmatov, Julien Signoles
2015 Proceedings of the 30th Annual ACM Symposium on Applied Computing - SAC '15  
In this work, we address memory monitoring in the context of runtime assertion checking of C programs annotated in E-ACSL, an expressive specification language offered by the FRAMA-C framework for analysis  ...  This combined monitoring technique has been implemented in the runtime assertion checking tool for E-ACSL.  ...  The authors thank the FRAMA-C team members for support and useful discussions. Special thanks to Matthieu Lemerre for his advice on implementation of the shadow memory technique.  ... 
doi:10.1145/2695664.2695815 dblp:conf/sac/JakobssonKS15 fatcat:b22ogv6f2ragdomnayo7s6cwza

The e-ACSL perspective on runtime assertion checking

Julien Signoles
2021 Proceedings of the 5th ACM International Workshop on Verification and mOnitoring at Runtime EXecution  
Runtime Assertion Checking (RAC) is the discipline of verifying program assertions at runtime, i.e. when executing the code.  ...  Here, we revisit these three RAC's research areas by emphasizing the works done in E-ACSL, which is both a BISL and a RAC tool for C code. We also compare it to others languages and tools.  ...  ACKNOWLEDGMENTS We would like to thank Thibaut Benjamin who proofreads an early version of this paper.  ... 
doi:10.1145/3464974.3468451 fatcat:qcnslj6awvep3lm6b4y5o5ayum

Monitoring Data Structures Using Hardware Transactional Memory [chapter]

Shakeel Butt, Vinod Ganapathy, Arati Baliga, Mihai Christodorescu
2012 Lecture Notes in Computer Science  
TxInt incorporates several optimizations to improve the performance of runtime monitoring, thereby enabling it to be an "always on" tool for continuous runtime monitoring of data structures.  ...  Our study shows that TxInt is effective at monitoring data structure properties, and that with suitable optimizations, it can do so with acceptable runtime overhead.  ...  GC-Assertions is also not applicable to low-level languages, such as C/C++, which use manual memory management. • Hardware-assisted Monitoring.  ... 
doi:10.1007/978-3-642-29860-8_26 fatcat:d3kmjoc4pbbu5ax7fkbcuywrgy

Soundness of a Dataflow Analysis for Memory Monitoring

Dara Ly, Nikolai Kosmatov, Julien Signoles, Frédéric Loulergue
2019 Zenodo  
An important concern addressed by runtime verification tools for C code is related to detecting memory errors.  ...  This paper tackles this issue for the dataflow analysis used to optimize the E-ACSL runtime assertion checking tool.We formally define the core dataflow analysis used by E-ACSL and prove its soundness.  ...  The work of the first author was partially funded by a Ph.D. grant of the French Ministry of Defence.  ... 
doi:10.5281/zenodo.3609498 fatcat:uovx6u3jw5dk3locxqb7mgk2nu

Soundness of a Dataflow Analysis for Memory Monitoring

Dara Ly, Nikolai Kosmatov, Julien Signoles, Frédéric Loulergue
2019 ACM SIGAda Ada Letters  
An important concern addressed by runtime verification tools for C code is related to detecting memory errors.  ...  This paper tackles this issue for the dataflow analysis used to optimize the E-ACSL runtime assertion checking tool.  ...  The work of the first author was partially funded by a Ph.D. grant of the French Ministry of Defence.  ... 
doi:10.1145/3375408.3375416 fatcat:wltw4hv5qfgnjkqzuyxps5ziqi

Efficient and Scalable Runtime Monitoring for Cyber–Physical System

Xi Zheng, Christine Julien, Rodion Podorozhny, Franck Cassez, Thierry Rakotoarivelo
2018 IEEE Systems Journal  
Brace strives to bound the computation overhead for CPS runtime verification while preserving a high level of monitoring accuracy in terms of the number of false positive and false negative reports.  ...  Our results demonstrate that Brace efficiently detects those errors and a few true bugs and is able to bound both the memory and computation overhead even in systems with large numbers of observed events  ...  To limit the memory required to store the idle period's events in the event buffer, the linear programing model searches for an optimal solution to minimize the memory usage while finding a satisfying  ... 
doi:10.1109/jsyst.2016.2614599 fatcat:ucnmxudpqrbljbad45twfxxxgi

Practical data breakpoints

Robert Wahbe, Steven Lucco, Susan L. Graham
1993 SIGPLAN notices  
A data breakpoint associates debugging actions with SPARC these optimizations reduced the average overhead to 25%. tion an unsafe instruction.  ...  Acknowledgements We wish to thank Oliver Sharp for his valuable com-  ...  As the optimizer generates code, it maintains an alias list of all memory operands en- countered while walking the expression DAG for a.  ... 
doi:10.1145/173262.155091 fatcat:tujebqg3zjarplbyuax37j2cee

Contract-based general-purpose GPU programming

Alexey Kolesnichenko, Christopher M. Poskitt, Sebastian Nanz, Bertrand Meyer
2015 SIGPLAN notices  
An obstacle to widespread adoption, however, is the difficulty of programming them and the low-level control of the hardware required to achieve good performance.  ...  Furthermore, runtime contract checking turns out to be feasible, as the contracts can be executed on the GPU.  ...  These can be monitored at runtime to help ensure the correctness of programs.  ... 
doi:10.1145/2936314.2814216 fatcat:cslgxvoivfgqrgnidx6koddprq

Contract-based general-purpose GPU programming

Alexey Kolesnichenko, Christopher M. Poskitt, Sebastian Nanz, Bertrand Meyer
2015 Proceedings of the 2015 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences - GPCE 2015  
An obstacle to widespread adoption, however, is the difficulty of programming them and the low-level control of the hardware required to achieve good performance.  ...  Furthermore, runtime contract checking turns out to be feasible, as the contracts can be executed on the GPU.  ...  These can be monitored at runtime to help ensure the correctness of programs.  ... 
doi:10.1145/2814204.2814216 dblp:conf/gpce/KolesnichenkoPN15 fatcat:r4fg6q766zhznkhrc4cy5b4aqm

Static Analysis And Runtime-Assertion Checking: Contribution To Security Counter-Measures

Dillon Pariente, Julien Signoles
2017 Zenodo  
Static analysis pinpoints alarms that must be converted into runtime checks. Therefore the verifier is able to only monitor the security critical points of the application.  ...  compromise the security of an application is detected during execution.  ...  of the paper.  ... 
doi:10.5281/zenodo.820856 fatcat:3ys7jr7vyvehfbhcxfknrfgu5u

A design and verification methodology for secure isolated regions

Rohit Sinha, Manuel Costa, Akash Lal, Nuno P. Lopes, Sriram Rajamani, Sanjit A. Seshia, Kapil Vaswani
2016 Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI 2016  
The runtime library includes core services such as secure communication channels and memory management.  ...  Our methodology consists of forcing the application to communicate with the external world through a narrow interface, compiling it with runtime checks that aid verification, and linking it with a small  ...  We gratefully acknowledge our shepherd Michael Hicks and the anonymous reviewers for their insightful feedback.  ... 
doi:10.1145/2908080.2908113 dblp:conf/pldi/0001CLLRSV16 fatcat:6dqxszlsonb7nltu5hmmypea6e

A design and verification methodology for secure isolated regions

Rohit Sinha, Manuel Costa, Akash Lal, Nuno P. Lopes, Sriram Rajamani, Sanjit A. Seshia, Kapil Vaswani
2016 SIGPLAN notices  
The runtime library includes core services such as secure communication channels and memory management.  ...  Our methodology consists of forcing the application to communicate with the external world through a narrow interface, compiling it with runtime checks that aid verification, and linking it with a small  ...  We gratefully acknowledge our shepherd Michael Hicks and the anonymous reviewers for their insightful feedback.  ... 
doi:10.1145/2980983.2908113 fatcat:mal7vs5nvvhhnkkawe7ct3v6pi

Speculative optimization using hardware-monitored guarded regions for java virtual machines

Lixin Su, Mikko H. Lipasti
2007 Proceedings of the 3rd international conference on Virtual execution environments - VEE '07  
Hardware monitors for exceptions throughout the region execution, and undoes the effects of the guarded region if an exception occurs, re-executing the region with a conventionally optimized version.  ...  This paper describes a novel approach for circumventing the optimization-crippling effects of exception semantics and streamlining the implementation of aggressive optimizations at run time.  ...  We thank the anonymous VEE reviewers for their extremely helpful comments and feedback.  ... 
doi:10.1145/1254810.1254814 dblp:conf/vee/SuL07 fatcat:mcjjgfshpjfy3f64mwq7jetlga

Application of Business-Driven Decision Making to RESTful Business Processes [chapter]

Qinghua Lu, Xiwei Xu, Vladimir Tosic, Liming Zhu
2012 Lecture Notes in Computer Science  
Therefore, we have now integrated into the RESTfulBP system an extended version of our MiniZnMASC middleware to enable concurrent selection of different REST-fulBP process fragments for different classes  ...  of user at runtime.  ...  The monitored runtime data is passed to MiniZnMASC in an XML file, which is used in the decision making.  ... 
doi:10.1007/978-3-642-34321-6_27 fatcat:nah4pxnjmnbnhc7wptlurng4uq

Compiler-aided methodology for low overhead on-line testing

Ghazaleh Nazarian, Robert M. Seepers, Christos Strydis, Georgi N. Gaydadjiev
2013 2013 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS)  
As alternative, software Signature-Monitoring (SM) schemes based on compiler assertions are an efficient method for control-flow-error detection.  ...  In this paper, compile-time Control-Flow-Graph (CFG) topology analysis is used to place best-suited assertions at optimal locations of the assembly code to reduce overheads.  ...  Many thanks are due to Bryan Olivier from ACE B.V. support team for his valuable help and Vlad M. Sima for his comments.  ... 
doi:10.1109/samos.2013.6621126 dblp:conf/samos/NazarianSSG13 fatcat:oq3ce2bdefftdnkjpgcscoq5oy
« Previous Showing results 1 — 15 out of 4,423 results