Filters








43,906 Hits in 5.1 sec

Selective control-flow abstraction via jumping

Sam Blackshear, Bor-Yuh Evan Chang, Manu Sridharan
2015 SIGPLAN notices  
We present jumping, a form of selective control-flow abstraction useful for improving the scalability of goal-directed static analyses.  ...  Jumping solves this problem by allowing the analysis to selectively abstract away control-flow between events irrelevant to a goal query while preserving information about the ordering of relevant events  ...  In this paper, we tackle the challenge of selective flow/pathsensitive abstraction by introducing jumping, a form of goaldirected control-flow abstraction that enables the analysis to jump directly to  ... 
doi:10.1145/2858965.2814293 fatcat:vhtybgxci5chtem4mlvdgvmara

Selective control-flow abstraction via jumping

Sam Blackshear, Bor-Yuh Evan Chang, Manu Sridharan
2015 Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications - OOPSLA 2015  
We present jumping, a form of selective control-flow abstraction useful for improving the scalability of goal-directed static analyses.  ...  Jumping solves this problem by allowing the analysis to selectively abstract away control-flow between events irrelevant to a goal query while preserving information about the ordering of relevant events  ...  In this paper, we tackle the challenge of selective flow/pathsensitive abstraction by introducing jumping, a form of goaldirected control-flow abstraction that enables the analysis to jump directly to  ... 
doi:10.1145/2814270.2814293 dblp:conf/oopsla/BlackshearCS15 fatcat:buty6avqgjbehbqudq5elmspli

Analysing Switch-Case Code with Abstract Execution

Niklas Holsti, Jan Gustafsson, Linus Källberg, Björn Lisper, Marc Herbstritt
2015 Worst-Case Execution Time Analysis  
Applications: -WCET analysis in the traditional way other analyses starting from machine code • Particular problem: Dynamic Transfer of Control (DTC) -call or jump to dynamically computed code address  ...  in particular from switch-case statements • switch-case DTC is amenable to local analysis • but hard to handle by annotations • Contributions: -apply Abstract Execution analysis to DTC evaluate Circular  ...  - flow graph WCET analysis Problem: dynamic transfer of control, DTC for example jump via register ?  ... 
doi:10.4230/oasics.wcet.2015.85 dblp:conf/wcet/HolstiGKL15 fatcat:y36tmgn4q5b47odxvzbmblv6hy

Interprocedural Control Flow Reconstruction [chapter]

Andrea Flexeder, Bogdan Mihaila, Michael Petter, Helmut Seidl
2010 Lecture Notes in Computer Science  
In this paper we provide an interprocedural algorithm for reconstructing the control flow of assembly code in presence of indirect jumps, call instructions and returns.  ...  For these, our methods succeed in resolving indirect jumps with high accuracy.  ...  via the abstract semantic evaluation function).  ... 
doi:10.1007/978-3-642-17164-2_14 fatcat:k66xlbpj75cbvfnfesrde2452y

A Turning Point for Verified Spectre Sandboxing [article]

Sunjay Cauligi, Marco Guarnieri, Daniel Moghimi, Deian Stefan, Marco Vassena
2022 arXiv   pre-print
However, while this prevents leaking via memory operations, this does not stop leakages via control flow.  ...  Architecturally, since all (forward-edge) indirect jumps are implemented via hardened jump table lookups, all such control flow will always target valid linear blocks.  ... 
arXiv:2208.01548v1 fatcat:pr3ebewkena5dgh75cjng7eeja

Modeling Method for the Coupling Relations of Microgrid Cyber-Physical Systems Driven by Hybrid Spatiotemporal Events

Xiaoyong Bo, Xiaoyu Chen, Huashun Li, Yunchang Dong, Zhaoyang Qu, Lei Wang
2021 IEEE Access  
Finally, four spatiotemporal events, namely state perception, network communication, intelligent decision-making, and action control, are defined.  ...  The essence of the microgrid cyber-physical system (CPS) lies in the cyclical conversion of information flow and energy flow.  ...  Based on the constructed microgrid CPS simulation environment described in Section 4.1, agent node 4 was selected, which obtains the decision result and generates control instructions via self-organizing  ... 
doi:10.1109/access.2021.3053402 fatcat:cf72kea2izdqxbuyofqebh6w7u

Methods of probing the two-phase flows (review)

D. E. Boltenko, E. A. Boltenko
2013 Thermal Engineering  
The interaction of the sensitivity probe element with the phase leads to a jump like variation in con ductivity of the controlled volume fixed by a secondary circuit.  ...  The necessary condition of using the probe is the smallness of the controlled volume of the medium compared with the volume of dispersed phases in the flow.  ...  The interaction of the sensitivity probe element with the phase leads to a jump like variation in con ductivity of the controlled volume fixed by a secondary circuit.  ... 
doi:10.1134/s004060151307001x fatcat:rfdteosmifdwlppphfah6jnoqe

Safety Verification for Probabilistic Hybrid Systems [chapter]

Lijun Zhang, Zhikun She, Stefan Ratschan, Holger Hermanns, Ernst Moritz Hahn
2010 Lecture Notes in Computer Science  
The interplay of random phenomena and continuous real-time control deserves increased attention for instance in wireless sensing and control applications.  ...  In this paper, we consider probabilistic hybrid systems and develop a general abstraction technique for verifying probabilistic safety problems.  ...  In addition to the thermostat case, we have considered a selection of other case studies: a bouncing ball assembled from different materials, a water level control system where sensor values may be delayed  ... 
doi:10.1007/978-3-642-14295-6_21 fatcat:p6uph75la5hgblgfmw7eacft2u

A New Formal Verification Approach for Hardware-dependent Embedded System Software

Bernard Schmidt, Carlos Villarraga, Thomas Fehmel, J^|^ouml;rg Bormann, Markus Wedler, Minh Nguyen, Dominik Stoffel, Wolfgang Kunz
2013 IPSJ Transactions on System LSI Design Methodology  
The control flow graph can also be understood as an abstract finite state machine controlling the combined hardware-software system. The nodes of the graph correspond to its control states.  ...  The upper thread of time frames shows the case for the select signal J 2 = 1, i.e., a jump to destination D 2 is taken at t = 2.  ... 
doi:10.2197/ipsjtsldm.6.135 fatcat:2xu5vfvcgjgp5agtwxeqpjrvwe

OAT: Attesting Operation Integrity of Embedded Devices [article]

Zhichuang Sun, Bo Feng, Long Lu, Somesh Jha
2019 arXiv   pre-print
OAT performs the remote control-flow verification through abstract execution, which is fast and deterministic.  ...  ., control-flow hijacks and data-only attacks).  ...  For control-flow attestation, the verifier performs a static abstract execution of the disassembled binary code. This abstract execution is guided by the forward-edge traces in the attestation blob.  ... 
arXiv:1802.03462v3 fatcat:u3ogiw5tpreebnt5skmzshjo2i

OAT: Attesting Operation Integrity of Embedded Devices

Zhichuang Sun, Bo Feng, Long Lu, Somesh Jha
2020 2020 IEEE Symposium on Security and Privacy (SP)  
OAT performs the remote control-flow verification through abstract execution, which is fast and deterministic.  ...  ., control-flow hijacks and data-only attacks).  ...  For control-flow attestation, the verifier performs a static abstract execution of the disassembled binary code. This abstract execution is guided by the forward-edge traces in the attestation blob.  ... 
doi:10.1109/sp40000.2020.00042 dblp:conf/sp/SunFLJ20 fatcat:rkgqqw4gpfbptdqoigprsqhcee

A compiler framework for the reduction of worst-case execution times

Heiko Falk, Paul Lokuciejewski
2010 Real-time systems  
All together, they help to obtain code explicitly optimized for its worst-case timing, to automate large parts of the real-time software design flow, and to reduce costs of a real-time system by allowing  ...  fact transformation Flow facts must be transformed by the WCC compiler whenever it changes the code's abstraction level or it applies control flow changes.  ...  Similarly, recursion depths are specified via flow restrictions.  ... 
doi:10.1007/s11241-010-9101-x fatcat:atxsoqt32zga7mwlplsnydkj2a

Design and Architecture of a Robot-Child Speech-Controlled Game

Samer Al Moubayed, Jill Lehman
2015 Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction Extended Abstracts - HRI'15 Extended Abstracts  
We describe the conceptual design, architecture, and implementation of a multimodal, robot-child dialogue system in a fast-paced, speech-controlled collaborative game.  ...  In Mole Madness, two players (a user and an anthropomorphic robot) work together to move an animated mole character through its environment via speech commands.  ...  Figure 1 . 1 Screen shot of Mole Madness -the blue mole rolls and leaps via the speech commands, "go" and "jump". Figure 3 . 3 A diagram of the different modules.  ... 
doi:10.1145/2701973.2702041 dblp:conf/hri/MoubayedL15 fatcat:rtwtktwk45g3pfn2gh75a43q2e

CHARDA: Causal Hybrid Automata Recovery via Dynamic Analysis

Adam Summerville, Joseph Osborn, Michael Mateas
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
CHARDA performs model selection and segmentation via a principled penalty function.  ...  (via new data or experimentation).  ... 
doi:10.24963/ijcai.2017/390 dblp:conf/ijcai/SummervilleOM17 fatcat:hnf5ztimc5fkrkut6xzg7wvgke

Obstacle Avoidance via Hybrid Feedback

Soulaimane Berkane, Andrea Bisoffi, Dimos V. Dimarogonas
2021 IEEE Transactions on Automatic Control  
The controller, exploiting hysteresis regions, employs a Zeno-free switching between two modes of control: stabilization and avoidance.  ...  Geometric Construction of the Flow and Jump Sets In this section, we construct explicitly the flow and jump sets where the stabilization and avoidance controllers are activated. 1) Safety Helmets: Our  ...  and jump sets in Section IV-B and the logical selections of the jump sets in Section IV-C.  ... 
doi:10.1109/tac.2021.3086329 fatcat:crwxr5g72zdbvnckvgw3y6p4uq
« Previous Showing results 1 — 15 out of 43,906 results