咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 16 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程

主题

  • 19 篇 control-flow gra...
  • 3 篇 instrumentation
  • 3 篇 algorithms
  • 2 篇 inlined referenc...
  • 2 篇 languages
  • 2 篇 cilk
  • 2 篇 llvm
  • 2 篇 binary rewriting
  • 2 篇 optimization
  • 2 篇 program verifica...
  • 2 篇 fork-join parall...
  • 2 篇 parallel computi...
  • 2 篇 multicore
  • 2 篇 vulnerabilities
  • 2 篇 tapir
  • 2 篇 measurement
  • 2 篇 satisfiability m...
  • 2 篇 compiling
  • 2 篇 openmp
  • 1 篇 program debuggin...

机构

  • 2 篇 mit comp sci & a...
  • 1 篇 concordia univ c...
  • 1 篇 univ wisconsin d...
  • 1 篇 univ calif river...
  • 1 篇 tsinghua univ sc...
  • 1 篇 princeton univ d...
  • 1 篇 computer science...
  • 1 篇 trusted labs meu...
  • 1 篇 beijing natl res...
  • 1 篇 tsinghua univ sc...
  • 1 篇 microsoft resear...
  • 1 篇 oppida montigny ...
  • 1 篇 moe key lab info...
  • 1 篇 univ arizona dep...
  • 1 篇 univ wisconsin m...
  • 1 篇 reykjavik univ r...
  • 1 篇 ucb lyon 1 ens l...
  • 1 篇 univ grenoble al...
  • 1 篇 university of ca...
  • 1 篇 princeton univer...

作者

  • 3 篇 ball t
  • 2 篇 chen jianhui
  • 2 篇 larus jr
  • 2 篇 he fei
  • 2 篇 moses william s.
  • 2 篇 schardl tao b.
  • 2 篇 leiserson charle...
  • 1 篇 ligatti jay
  • 1 篇 darte alain
  • 1 篇 sato m
  • 1 篇 rangan cp
  • 1 篇 erlingsson ulfar
  • 1 篇 perdana riza sat...
  • 1 篇 debbabi mourad
  • 1 篇 bagnara roberto
  • 1 篇 rukmono satrio a...
  • 1 篇 elbaz-vincent ph...
  • 1 篇 bergamaschi ra
  • 1 篇 liao s
  • 1 篇 tjiang s

语言

  • 18 篇 英文
  • 1 篇 其他
检索条件"主题词=Control-flow Graph"
19 条 记 录,以下是11-20 订阅
排序:
control-flow Integrity Principles, Implementations, and Applications
收藏 引用
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2009年 第1期13卷 4-4页
作者: Abadi, Martin Budiu, Mihai Erlingsson, Ulfar Ligatti, Jay Univ Calif Santa Cruz Dept Comp Sci Santa Cruz CA 95064 USA Univ S Florida Dept Comp Sci & Engn Tampa FL 33620 USA Reykjavik Univ Reykjavik Iceland
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks from arbitrarily controlling pro... 详细信息
来源: 评论
control-flow integrity  05
Control-flow integrity
收藏 引用
Proceedings of the 12th ACM conference on Computer and communications security
作者: Martín Abadi Mihai Budiu Úlfar Erlingsson Jay Ligatti University of California Santa Cruz Microsoft Research Silicon Valley Princeton University Princeton NJ
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, control-flow Integrity (CFI), can prevent such attacks from arbitrarily controlling pro... 详细信息
来源: 评论
Paged absolute addressing mode optimizations for embedded digital signal processors using post-pass data-flow analysis
收藏 引用
DESIGN AUTOMATION FOR EMBEDDED SYSTEMS 1999年 第1期4卷 41-59页
作者: Sudarsanam, A Malik, S Tjiang, S Liao, S Princeton Univ Dept Elect Engn Princeton NJ 08544 USA Tensilica Inc Cupertino CA USA Synopsys Inc Mountain View CA USA
We address the problem of code generation for embedded DSP systems. In such systems, it is typical for one or more digital signal processors (DSPs), program memory, and custom circuitry to be integrated onto a single ... 详细信息
来源: 评论
Fast scheduling and allocation algorithms for entropy CODEC
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 1997年 第10期E80D卷 982-992页
作者: Suzuki, K Togawa, N Sato, M Ohtsuki, T School of Science and Engineering Waseda University Tokyo 169 Japan
Entropy coding/decoding are implemented on FPGAs as a fast and flexible system in which high-level synthesis technologies are key issues. In this paper, we propose scheduling and allocation algorithms for behavioral d... 详细信息
来源: 评论
control-flow versus data-flow-based scheduling: Combining both approaches in an adaptive scheduling system
收藏 引用
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 1997年 第1期5卷 82-100页
作者: Bergamaschi, RA Raje, S Nair, I Trevillyan, L IBM Thomas J. Watson Res. Center Yorktown Heights NY USA
As high-level synthesis techniques gain acceptance among designers, it is important to be able to provide a robust system which can handle large designs in short execution times, producing high-quality results. Schedu... 详细信息
来源: 评论
Approximate triclique coloring for register allocation
收藏 引用
INFORMATION PROCESSING LETTERS 1996年 第5期60卷 249-253页
作者: Venkatesan, G Rangan, CP INDIAN INST TECHNOL DEPT COMP SCI & ENGNMADRAS 600036TAMIL NADUINDIA
A graph is said to be a triclique if its vertex set can be partitioned into three cliques, i.e. if its complement is tripartite. We prove that the colouring problem is NP-complete even when restricted to tricliques wh... 详细信息
来源: 评论
REWRITING EXECUTABLE FILES TO MEASURE PROGRAM BEHAVIOR
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 1994年 第2期24卷 197-218页
作者: LARUS, JR BALL, T Computer Sciences Department University of Wisconsin-Madison 1210 West Dayton Street Madison WI 53706 U.S.A.
Inserting instrumentation code in a program is an effective technique for detecting, recording, an measuring many aspects of a program's performance. Instrumentation code can be added at any stage of the compilati... 详细信息
来源: 评论
OPTIMALLY PROFILING AND TRACING PROGRAMS
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 1994年 第4期16卷 1319-1360页
作者: BALL, T LARUS, JR UNIV WISCONSIN DEPT COMP SCIMADISONWI 53706
This paper describes algorithms for inserting monitoring code to profile and trace programs. These algorithms greatly reduce the cost of measuring programs with respect to the commonly used technique of placing code i... 详细信息
来源: 评论
EFFICIENTLY COUNTING PROGRAM EVENTS WITH SUPPORT FOR ONLINE QUERIES
收藏 引用
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS 1994年 第5期16卷 1399-1410页
作者: BALL, T UNIV WISCONSIN MADISONWI
The ability to count events in a program's execution is required by many program analysis applications. We present an instrumentation method for efficiently counting events in a program's execution, with suppo... 详细信息
来源: 评论