Sciweavers

CGO
2016
IEEE
8 years 28 days ago
BlackBox: lightweight security monitoring for COTS binaries
After a software system is compromised, it can be difficult to understand what vulnerabilities attackers exploited. Any information residing on that machine cannot be trusted as ...
Byron Hawkins, Brian Demsky, Michael B. Taylor
CGO
2016
IEEE
8 years 28 days ago
Inference of peak density of indirect branches to detect ROP attacks
A program subject to a Return-Oriented Programming (ROP) attack usually presents an execution trace with a high frequency of indirect branches. From this observation, several rese...
Mateus Tymburibá, Rubens E. A. Moreira, Fer...
CGO
2016
IEEE
8 years 28 days ago
Sparse flow-sensitive pointer analysis for multithreaded programs
For C programs, flow-sensitivity is important to enable pointer analysis to achieve highly usable precision. Despite significant recent advances in scaling flow-sensitive point...
Yulei Sui, Peng Di, Jingling Xue
CGO
2016
IEEE
8 years 28 days ago
Portable performance on asymmetric multicore processors
Static and dynamic power constraints are steering chip manufacturers to build single-ISA Asymmetric Multicore Processors (AMPs) with big and small cores. To deliver on their energ...
Ivan Jibaja, Ting Cao, Stephen M. Blackburn, Kathr...
CGO
2016
IEEE
8 years 28 days ago
Validating optimizations of concurrent C/C++ programs
We present a validator for checking the correctness of LLVM compiler optimizations on C11 programs as far as concurrency is concerned. Our validator checks that optimizations do n...
Soham Chakraborty, Viktor Vafeiadis
CGO
2016
IEEE
8 years 28 days ago
Exploiting recent SIMD architectural advances for irregular applications
A broad class of applications involve indirect or datadependent memory accesses and are referred to as irregular applications. Recent developments in SIMD architectures – speci...
Linchuan Chen, Peng Jiang, Gagan Agrawal