Filters








42,975 Hits in 4.6 sec

Static Analysis for Guarded Code [chapter]

Ping Hu
2000 Lecture Notes in Computer Science  
code $ h e t R ³ V 5 4 § x p R þ g d o S U R u ¤ h e g d t R © u R r t s v u w c x r y v x ® y c h y s r B o !  ...  h f e t R U V b H u ª b d f R g v d f S ' R u 3 h e g d t R T u R H H H d b R © R ³ ² AE u R t i v R © t v u S i H R ¬ u i t v u r µ u h t d f H h R T u i H R ¬ R T ± i u i H R ¬ h e t R f x=y+1 (b) Guarded  ... 
doi:10.1007/3-540-40889-4_4 fatcat:tga6oowyg5cjjiroinbchux7vm

Turbo DiSL: Partial Evaluation for High-Level Bytecode Instrumentation [chapter]

Yudi Zheng, Danilo Ansaloni, Lukas Marek, Andreas Sewe, Walter Binder, Alex Villazón, Petr Tuma, Zhengwei Qi, Mira Mezini
2012 Lecture Notes in Computer Science  
Bytecode instrumentation is a key technique for the implementation of dynamic program analysis tools such as profilers and debuggers.  ...  In this paper we introduce Turbo, a novel partial evaluator for DiSL, which processes the generated instrumentation code, performs constant propagation, conditional reduction, and pattern-based code simplification  ...  It was supported by the Scientific Exchange Programme NMS-CH (project code 10.165), by a Sino-Swiss Science and Technology Cooperation (SSSTC) Institutional Partnership (project no.  ... 
doi:10.1007/978-3-642-30561-0_24 fatcat:qwpsmeinhrggbm5juwej3tdcwm

A Static Code and Dynamic Data Attestation based Intrusion Detection System for Wireless Sensor Networks

Neelam ASurti, Devesh C Jinwala
2015 International Journal of Computer Applications  
The static code attestation techniques published in the literature only check the integrity of the static code embedded within sensor nodes whereas the dynamic data attestation techniques check the structural  ...  In this paper, we propose our integrated approach for countering attacks based on code attestation.  ...  Result Analysis Memory required in terms of RAM and ROM usage in bytes and energy consumption in joules are considered for static code attestation, dynamic data attestation and combined algorithms.  ... 
doi:10.5120/21167-4234 fatcat:q2vu4sy4vrgodi3ulzqe7b44qi

Securing Mobile Agents Control Flow Using Opaque Predicates [chapter]

Anirban Majumdar, Clark Thomborson
2005 Lecture Notes in Computer Science  
However, the lack of security in the form of code confidentiality renders this paradigm unsuitable for commercial software.  ...  These characteristics of mobile agents provide an excellent means of meeting the distributed and heterogeneous requirements for many electronic commerce applications involving low bandwidth and intermittently  ...  adversary to find out the correct behaviour from mobile agent code by statically analysing it.  ... 
doi:10.1007/11553939_149 fatcat:zknad3gejnf57o7xzquvcx7nhm

Java Bytecode Instrumentation Made Easy: The DiSL Framework for Dynamic Program Analysis [chapter]

Lukáš Marek, Yudi Zheng, Danilo Ansaloni, Aibek Sarimbekov, Walter Binder, Petr Tůma, Zhengwei Qi
2012 Lecture Notes in Computer Science  
, and efficiency of the generated code.  ...  We illustrate the strengths of DiSL with a concrete analysis as a case study. The DiSL framework is open-source and has been successfully used in several research projects.  ...  detection based on control flow analysis } } Loop guard skeleton @Before(marker=BodyMarker.class, guard=LoopGuard.class) static void onMethodEntry() { ... } @After(marker=BodyMarker.class, guard=LoopGuard.class  ... 
doi:10.1007/978-3-642-35182-2_18 fatcat:vhdjowlzknci3guwaw6xbysjvi

DiSL

Lukáš Marek, Alex Villazón, Yudi Zheng, Danilo Ansaloni, Walter Binder, Zhengwei Qi
2012 Proceedings of the 11th annual international conference on Aspect-oriented Software Development - AOSD '12  
, and weave-time execution of user-defined static analysis code.  ...  many analysis tasks and the code generated by weavers in support of certain language features incurs high overhead.  ...  The authors thank Aibek Sarimbekov and Achille Peternier for their help with jBORAT, and Andreas Sewe for testing DiSL and providing detailed feedback.  ... 
doi:10.1145/2162049.2162077 dblp:conf/aosd/MarekVZABQ12 fatcat:dwbzh3tz6vbobkaloheecyhsfa

Declarative Specialization for Object-Oriented-Program Specialization

Helle Markmann Andersen, Ulrik Pagh Schultz
2004 DAIMI Report Series  
The Pesto compiler auto-</p> <p>matically generates the context information needed for specializing Java</p> <p>programs, and automatically generates guards that enable the specialized</p> <p>code in the  ...  We have developed a simple, declar-</p> <p>ative language for controlling the specialization of Java programs, and in-</p> <p>terfaced this language with the JSpec partial evaluator for Java.  ...  We are grateful to Julia Lawall for her comments on an early version of this article. Thanks are also due to the anonymous referees for perceptive and useful reviews.  ... 
doi:10.7146/dpb.v33i569.7126 fatcat:zms7cysoxnazljitvxikhjrohq

Declarative specialization for object-oriented-program specialization

Helle Markmann Andersen, Ulrik Pagh Schultz
2004 Proceedings of the 2004 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation - PEPM '04  
The Pesto compiler automatically generates the context information needed for specializing Java programs, and automatically generates guards that enable the specialized code in the right context.  ...  We have developed a simple, declarative language for controlling the specialization of Java programs, and interfaced this language with the JSpec partial evaluator for Java.  ...  We are grateful to Julia Lawall for her comments on an early version of this article. Thanks are also due to the anonymous referees for perceptive and useful reviews.  ... 
doi:10.1145/1014007.1014011 dblp:conf/pepm/AndersenS04 fatcat:265z5e4rlfdpdjj35kvo3ya3yy

Specialization tools and techniques for systematic optimization of system software

Dylan McNamee, Renauld Marlet, Jonathan Walpole, Calton Pu, Crispin Cowan, Charles Krasic, Ashvin Goel, Perry Wagle, Charles Consel, Gilles Muller
2001 ACM Transactions on Computer Systems  
Specialization has been recognized as a powerful technique for optimizing operating systems.  ...  Acknowledgements We would like to thank Julia Lawall for her insightful comments on multiple versions of this paper.  ...  We would also like to thank the TOCS reviewers for their careful critiques, which improved many aspects of our presentation.  ... 
doi:10.1145/377769.377778 fatcat:kyqfyjqkzrfafatpbvq25gcczi

Efficient validation input generation in RTL by hybridized source code analysis

Lingyi Liu, S Vasudevan
2011 2011 Design, Automation & Test in Europe  
HYBRO uses dynamic simulation data and static analysis of RTL control flow graphs (CFGs). A concrete simulation is applied over a fixed number of cycles.  ...  Instrumented code records the branches covered. The corresponding symbolic trace is extracted from the CFG with an RTL symbolic execution engine. A guard in the symbolic expression is mutated.  ...  HYBRO uses static as well as dynamic program analysis techniques for test generation in RTL.  ... 
doi:10.1109/date.2011.5763253 dblp:conf/date/LiuV11 fatcat:7tv7pjyqebhebdejf6nvzwjh3y

Stubbifer: Debloating Dynamic Server-Side JavaScript Applications (Code Artifact + Experiments) [article]

Alexi Turcotte, Ellen Arteca, Ashish Mishra, Saba Alimadadi, Frank Tip
2021 Zenodo  
The technique also provides an optional guarded execution mode to guard application against injection vulnerabilities in untested code that resulted from stub expansion.  ...  We present a fully automatic technique that identifies dead code by constructing static or dynamic call graphs from the application's tests, and replacing code deemed unreachable with either file- or function-level  ...  static or dynamic analysis and code splitting.  ... 
doi:10.5281/zenodo.5599913 fatcat:wzq46yc4fbcnhkupla5jzezjye

Stubbifier: Debloating Dynamic Server-Side JavaScript Applications [article]

Alexi Turcotte, Ellen Arteca, Ashish Mishra, Saba Alimadadi, Frank Tip
2021 arXiv   pre-print
We present a fully automatic technique that identifies unused code by constructing static or dynamic call graphs from the application's tests, and replacing code deemed unreachable with either file- or  ...  The technique also provides an optional guarded execution mode to guard application against injection vulnerabilities in untested code that resulted from stub expansion.  ...  static or dynamic analysis and code splitting.  ... 
arXiv:2110.14162v1 fatcat:h7ere3ojrrdxzpzirtvfnrds4a

A static analyzer for finding dynamic programming errors

William R. Bush, Jonathan D. Pincus, David J. Sielaff
2000 Software, Practice & Experience  
( but for code generation ) 1.  ...  leaks 3. for code generation -not for error-checking 2.  ...  Pseudo-code for function simulation.  ... 
doi:10.1002/(sici)1097-024x(200006)30:7<775::aid-spe309>3.0.co;2-h fatcat:576uitogorehjnwo5tfgvecnry

Tamper Resistant Software by Integrity-Based Encryption [chapter]

Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon
2004 Lecture Notes in Computer Science  
Protecting the software code means some level of assurance that the program will execute as expected even if it encounters the illegitimated modifications.  ...  It can be broadly classified into the static analysis and dynamic analysis, according to the attacker's aptitude for analysis.  ...  Our goal for tamper resistant software is to defend against static analysis and dynamic analysis up to the level of dynamic substitution for the program instruction.  ... 
doi:10.1007/978-3-540-30501-9_117 fatcat:iyapcssj5vbydh3djqbham3yny

Partial-evaluation techniques for concurrent programs

Mihnea Marinescu, Benjamin Goldberg
1997 SIGPLAN notices  
A standard binding-time analysis for imperative languages is extended in order to deal with the basic concurrent constructs (synchronous communication and nondeterministic choice).  ...  However, a simple approximate analysis for detecting and removing redundant synchronizations from the residual program (i.e. synchronizations whose removal does not increase the nondeterminism of a program  ...  Acknowledgements: We are grateful to Olivier Danvy and the anonymous reviewers for their comments.  ... 
doi:10.1145/258994.259002 fatcat:ylefkvztybc6phtvrr5us6vpbi
« Previous Showing results 1 — 15 out of 42,975 results