نتایج جستجو برای: control flow graph cfg

تعداد نتایج: 1924486  

1997
Quinn Jacobson Steve Bennett Nikhil Sharma James E. Smith

The Multiscalar architecture executes a single sequential program following multiple flows of control. In the Multiscalar hardware, a global sequencer, with help from the compiler, takes large steps through the program’s control flow graph (CFG) speculatively, starting a new thread of control (task) at each step. This is inter-task control flow speculation. Within a task, traditional control fl...

2017
Julian Kirsch Clemens Jonischkeit Thomas Kittel Apostolis Zarras Claudia Eckert

Piracy is a persistent headache for software companies that try to protect their assets by investing both time and money. Program code obfuscation as a sub-field of software protection is a mechanism widely used toward this direction. However, effectively protecting a program against reverse-engineering and tampering turned out to be a highly non-trivial task that still is subject to ongoing re...

2014
Mark Hills

A control flow graph (CFG) is used to model possible paths through a program, and is an essential part of many program analysis algorithms. While programs to construct CFGs can be written in metaprogramming languages such as Rascal, writing such programs is currently quite tedious. With the goal of streamlining this process, in this paper we present DCFlow, a domain-specific language and Rascal...

Journal: :Comput. J. 2015
Shahid Alam Issa Traoré Ibrahim Sogukpinar

Metamorphism is a technique that mutates the binary code using different obfuscations and never keeps the same sequence of opcodes in the memory. This stealth technique provides the capability to a malware for evading detection by simple signature-based (such as instruction sequences, byte sequences and string signatures) anti-malware programs. In this paper, we present a new scheme named Annot...

Journal: :Scalable Computing: Practice and Experience 2013
Gentiana Ioana Latiu Octavian Cret Lucia Vacariu

Evolutionary structural testing is a technique that uses specific approaches based on guided searches algorithms. It involves evaluating fitness functions to determine whether test data satisfy or not various structural testing criteria. For testing multi-way decision constructs the nested If-Then-Else structure and Alternative Critical Branches (ACBs) approaches are generally used. In this pap...

Journal: :Acta Cybern. 2014
Richárd Dévai Judit Jász Csaba Nagy Rudolf Ferenc

A good compiler which implements many optimizations during its compilation phases must be able to perform several static analysis techniques such as control flow or data flow analysis. Besides compilers, these techniques are common for static analyzers as well to retrieve information from source code, for example for code auditing, quality assurance or testing purposes. Implementing control flo...

2010
Rajendra Kumar

In this paper we introduce control flow prediction (CFP) in parallel register sharing architecture. The main idea behind this concept is to use a step beyond the prediction of common branch and permitting the hardware to have the information about the CFG (Control Flow Graph) components of the program to have better branch decision in navigation. The degree of ILP depends upon the navigation ba...

Journal: :CoRR 2017
Robert V. Lim Boyana Norris Allen D. Malony

Accelerator architectures specialize in executing SIMD (single instruction, multiple data) in lockstep. Because the majority of CUDA applications are parallelized loops, control flow information can provide an in-depth characterization of a kernel. CUDAflow is a tool that statically separates CUDA binaries into basic block regions and dynamically measures instruction and basic block frequencies...

2008
Giacomo Buonanno Fabrizio Ferrandi Franco Fummi Donatella Sciuto Patrizia Cavalloro

The test problem increasingly affects system design process, related costs and time to market. Requirements from VLSI/WSI manufacturers are for fast and reliable testability tools, with the possibility of their introduction in early phases of design. In this paper we describe the different abstraction levels at which testability analysis will be applied in the REQUEST Project. The global tool-s...

2003
Xiaotong Zhuang Santosh Pande

Mobile code carried by a mobile agent can automatically travel to several data sources in order to complete a designated program. Traditionally, most mobile agent systems [7][8][13] need explicit involvement of the programmer to designate migration and computation schedule of the agent. In this paper, we study the compilersupported agent scheduling to optimize either the number of the migration...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید