Sciweavers

Share
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
7 years 3 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
CASES
2010
ACM
8 years 11 months ago
Real-time unobtrusive program execution trace compression using branch predictor events
Unobtrusive capturing of program execution traces in real-time is crucial in debugging cyber-physical systems. However, tracing even limited program segments is often cost-prohibi...
Vladimir Uzelac, Aleksandar Milenkovic, Martin Bur...
ENTCS
2002
73views more  ENTCS 2002»
9 years 1 months ago
Reducing the Overhead of Dynamic Analysis
Dynamic analysis (instrumenting programs with code to detect and prevent errors during program execution) can be an effective approach to debugging, as well as an effective means ...
Suan Hsi Yong, Susan Horwitz
COMSIS
2007
128views more  COMSIS 2007»
9 years 1 months ago
Constructing program animations using a pattern-based approach
The aim of this paper is to discuss how our pattern-based strategy for the visualization of data and control flow can effectively be used to animate the program and exhibit its beh...
Daniela Carneiro da Cruz, Pedro Rangel Henriques, ...
IJCAI
1997
9 years 2 months ago
Reasoning about Concurrent Execution Prioritized Interrupts, and Exogenous Actions in the Situation Calculus
As an alternative to planning, an approach to highlevel agent control based on concurrent program execution is considered. A formal definition in the situation calculus of such a ...
Giuseppe De Giacomo, Yves Lespérance, Hecto...
EMSOFT
2008
Springer
9 years 3 months ago
Active property checking
Runtime property checking (as implemented in tools like Purify or Valgrind) checks whether a program execution satisfies a property. Active property checking extends runtime check...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
COMPSAC
2008
IEEE
9 years 3 months ago
Avoiding Program Failures Through Safe Execution Perturbations
We present an online framework to capture and recover from program failures and prevent them from occurring in the future through safe execution perturbations. The perturbations a...
Sriraman Tallam, Chen Tian, Rajiv Gupta, Xiangyu Z...
ISSAC
1995
Springer
155views Mathematics» more  ISSAC 1995»
9 years 4 months ago
On the Implementation of Dynamic Evaluation
Dynamic evaluation is a technique for producing multiple results according to a decision tree which evolves with program execution. Sometimes it is desired to produce results for ...
Peter A. Broadbery, T. Gómez-Díaz, S...
DSN
2007
IEEE
9 years 5 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ISCA
1992
IEEE
113views Hardware» more  ISCA 1992»
9 years 5 months ago
Dynamic Dependency Analysis of Ordinary Programs
A quantitative analysis of program execution is essential to the computer architecture design process. With the current trend in architecture of enhancing the performance of unipr...
Todd M. Austin, Gurindar S. Sohi
books