699,888 Hits in 4.6 sec

Trace-based control-flow analysis

Benoît Montagu, Thomas Jensen
2021 Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation  
We define ∇CFA, a widening-based analysis that limits the cycles in call stacks, and can achieve better precision than -CFA at a similar cost.  ...  By abstracting the computation traces, we reconstruct -CFA using abstract interpretation, and justify constraint-based -CFA in a semantic way.  ...  First, we show that the control-flow analysis of a λ-term is an abstraction of its execution trace.  ... 
doi:10.1145/3453483.3454057 fatcat:hpnb2jttn5anbpg6sd4bhwtxcq

Widening for Control-Flow [chapter]

Ben Hardekopf, Ben Wiedermann, Berkeley Churchill, Vineeth Kashyap
2014 Lecture Notes in Computer Science  
We present a parameterized widening operator that determines the control-flow sensitivity of an analysis, i.e., its flow-sensitivity, context-sensitivity, and path-sensitivity.  ...  Additionally, we show that the space of control-flow sensitivities induced by this widening operator forms a lattice.  ...  Trace Abstractions. We have posited that control-flow sensitivity is based on an abstraction of the execution history of a program, called a trace.  ... 
doi:10.1007/978-3-642-54013-4_26 fatcat:2ieam7ala5c6zlf4jhgkik2hzy

Effects of retrospective quality control on pressure-flow data with computer-based urodynamic systems from men with benign prostatic hyperplasia

Li-Min Liao, Werner Schaefer
2007 Asian Journal of Andrology  
Retrospective quality control of pressure-flow data with computer-based systems is necessary. (Asian J Androl 2007 Nov; 9: 771-780)  ...  Aim: To evaluate the effects of retrospective quality control on pressure-flow data with computer-based urodynamic systems from men with benign prostatic hyperplasia (BPH).  ...  The necessity of quality control in retrospective analysis of pressure-flow data with computer-based urodynamic systems was discussed.  ... 
doi:10.1111/j.1745-7262.2007.00304.x pmid:17968462 fatcat:con4rqv45jgsngzn5cyilac2ca

Cutting Through the Complexity of Reverse Engineering Embedded Devices

Sam L. Thomas, Jan Van den Herrewegen, Georgios Vasilakis, Zitai Chen, Mihai Ordean, Flavio D. Garcia
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Performing security analysis of embedded devices is a challenging task.  ...  Our evaluation spans firmware based on three RTOSes, an automotive ECU, and a 4G/LTE baseband.  ...  It enables us to incorporate reverse engineering policy-specific information extracted from the input trace (such as control-flow edges) and use it to drive further static analysis-based refinement, which  ... 
doi:10.46586/tches.v2021.i3.360-389 fatcat:hrw6z3dfw5bxndoxeye53rphkq

Practical Verification of MapReduce Computation Integrity via Partial Re-execution [article]

Eunjung Yoon, Peng Liu
2020 arXiv   pre-print
However, untrusted cloud services do not ensure the integrity of data and computations while clients have no control over the outsourced computation or no means to check the correctness of the execution  ...  workers involved in the that produced the incorrect computation. (2) it can reduce the overhead of verification via partial re-execution with carefully selected input data and program code using program analysis  ...  The attack is detected by control flow analysis and control flow filtering.  ... 
arXiv:2002.09560v1 fatcat:25t25xsnabhpfkggrt5oo7pf5i

OpenFlow driven ethernet traffic analysis

Andrea Bianco, Vengatanathan Krishnamoorthi, Nanfang Li, Luca Giraudo
2014 2014 IEEE International Conference on Communications (ICC)  
We perform an Ethernet trace analysis on the controller by defining flow characteristics as would be seen by an OpenFlow controller.  ...  We study the potential trace impact on an OpenFlow controller, analyzing among others, the number of flows, flow inter arrival times, traffic volumes and flow size distribution.  ...  Maggiora, members of the IT Infrastructure Division-Information Technology Area of Politecnico di Torino, for their support in the link mirroring configuration and Kamran Ali for processing some of the traces  ... 
doi:10.1109/icc.2014.6883781 dblp:conf/icc/BiancoKLG14 fatcat:wpsmkoyx6nh37cj563celssmk4

Research and Application of Quality Control in the Whole Process of Production Logistics Based on IACT2

Miao-zhen GUO, Guang-rui ZHOU, Yu-min WANG, Ming CHEN, Min ZHANG
2018 DEStech Transactions on Computer Science and Engineering  
Integrated with manual operation, a logistics quality control system of intelligent production is constructed to achieve the goal of error-preventing and accurate tracking and tracing.  ...  based on the minimum logistic unit.  ...  [3] Quality Control Analysis Method of IACT 2 IACT 2 means I (identification), A (analysis), C (control) and T 2 (forward and reverse tracing back).  ... 
doi:10.12783/dtcse/cmee2017/20079 fatcat:fu7l5de46nc4dd3ba5hpw4n2ie

Hardware-assisted instruction profiling and latency detection

Suchakrapani Datt Sharma, Michel Dagenais
2016 The Journal of Engineering  
An obvious contender in-kernel control-flow tracing for our Intel PT-based framework is Ftrace [39] .  ...  Ftrace and PT analysis: We also compared the hardware control-flow tracing with the closest current software solutions in the Linux kernel.  ... 
doi:10.1049/joe.2016.0127 fatcat:cjmvjog2i5akzcxqsbyfcrmzz4

HeNet: A Deep Learning Approach on Intel^ Processor Trace for Effective Exploit Detection [article]

Li Chen, Salmin Sultana, Ravi Sahita
2018 arXiv   pre-print
We investigate control flow based characterization of a program execution to build robust deep learning malware classifiers.  ...  We use Intel^ Processor Trace enabled processor for low overhead execution tracing and design a lightweight image conversion and segmentation of the control flow trace.  ...  processors, to collect control flow trace.  ... 
arXiv:1801.02318v1 fatcat:5lnx2pj7sjggnbdmbliatqizla

A Framework for Understanding Dynamic Anti-Analysis Defenses

Jing Qiu, Babak Yadegari, Brian Johannesmeyer, Saumya Debray, Xiaohong Su
2014 Proceedings of the 4th Program Protection and Reverse Engineering Workshop on 4th Program Protection and Reverse Engineering Workshop - PPREW-4  
This paper proposes an information-flow-based framework that encompasses a wide variety of anti-analysis defenses.  ...  We illustrate the utility of our approach using two different instances of this framework: self-checksumming-based anti-tampering defenses and timing-based emulator detection.  ...  Afterwards a control flow graph can be generated from the trace, which is then used to extract control dependencies.  ... 
doi:10.1145/2689702.2689704 dblp:conf/acsac/QiuYJDS14 fatcat:yt6sokgqxbfzlnatdou3g5nlpy

Reactive logic in software-defined networking: Measuring flow-table requirements

Maurizio Dusi, Roberto Bifulco, Francesco Gringoli, Fabian Schneider
2014 2014 International Wireless Communications and Mobile Computing Conference (IWCMC)  
We examine links located in various parts of the network and we consider different flow definitions to evaluate the feasibility of using SDN controllers in both access and core network scenarios.  ...  In particular we focus on the implications of reactive installation of flow entries in the switch fabric: by analyzing traffic traces captured in different scenarios we show the existence of a trade-off  ...  Figure 3 shows the results of this analysis for the DSLAM trace, with flow definition based on /32 source and /32 destination IP addresses, and for the CAIDA2013 trace, with flow definition based on /  ... 
doi:10.1109/iwcmc.2014.6906380 dblp:conf/iwcmc/DusiBGS14 fatcat:imcyfak5vfh4ddhmkyth723tge

Enabling Automated Bug Detection for IP-based Designs using High-Level Synthesis

Pietro Fezzardi, Christian Pilato, Fabrizio Ferrandi
2018 IEEE design & test  
Control Flow Traces The Control Flow is a high-level description of the "paths of execution".  ...  The same property holds both for control-flow and operation traces.  ... 
doi:10.1109/mdat.2018.2824121 fatcat:g63mjz76yncw5l2tob7xvd2mrm

Low Overhead Hardware-Assisted Virtual Machine Analysis and Profiling

Suchakrapani Datt Sharma, Hani Nemati, Genevieve Bastien, Michel Dagenais
2016 2016 IEEE Globecom Workshops (GC Wkshps)  
Furthermore, we developed interactive Resource and Process Control Flow visualization tools to analyze the hardware trace data and present a real-life usecase in the paper that allowed us to see unexpected  ...  Modern tracing tools such as LTTng allow fine grained analysis -albeit at a minimal execution overhead, and being OS dependent.  ...  For our VM Control Flow View, we demonstrate a RabbitMQ based message queuing system that performs MD5 hashing.  ... 
doi:10.1109/glocomw.2016.7848953 dblp:conf/globecom/SharmaNBD16 fatcat:tbscror6q5hajcbnzj2eizk2wq

Data Flow-Oriented Process Mining to Support Security Audits [chapter]

Thomas Stocker
2012 Lecture Notes in Computer Science  
Process mining techniques can provide models for the actual process behavior, but mostly disregard the dynamics of processes running in highly flexible environments and neglect the data flow perspective  ...  Security analysis is limited to control flow properties and cannot check data flow oriented properties.  ...  requiring both data flow and control flow.  ... 
doi:10.1007/978-3-642-31875-7_18 fatcat:qteyzn53j5balpztrzequrpwue

Performance Analysis of Wheeling Charges Determination Using Bialek's Tracing Method Employing With IPFC Controller in Deregulated Environment

P. Vidhya, R. Ashok Kumar, K. Asokan
2017 IOSR Journal of Electrical and Electronics Engineering  
In this article, an attempt has been made to introduce a new flow based Bialek's tracing method to calculate the wheeling charge involving with optimal placement of recent FACTS devices of IPFC controller  ...  In this scenario, tracing the flow of electricity has been gaining much more importance and its solution helps in evaluating a fair and transparent tariff.  ...  It can be seen that the base case power flow increase in most of the cases. In order to calculate the line flows and flows caused by each transaction, AC load flow analysis has been carried out.  ... 
doi:10.9790/1676-1202036475 fatcat:7uef4vzewrdzrdknbggmcpeiiy
« Previous Showing results 1 — 15 out of 699,888 results