Primitive types are fundamental components available in any programminglanguage, which serve as the building blocks of data manipulation. Understanding the role of these types in source code is essential to write sof...
详细信息
This investigates the relationship between eye fixation patterns and performance in javaprogramming exercises using eye-tracking technology. Thirty-one students from a university in Metro Manila participated, and the...
详细信息
We introduce the DeTerministic Virtual Machine (DTVM) Stack, a next-generation smart contract execution framework designed to address critical performance, determinism, and ecosystem compatibility challenges in blockc...
详细信息
We introduce the DeTerministic Virtual Machine (DTVM) Stack, a next-generation smart contract execution framework designed to address critical performance, determinism, and ecosystem compatibility challenges in blockchain networks. Building upon WebAssembly (Wasm) while maintaining full Ethereum Virtual Machine (EVM) ABI compatibility, DTVM introduces a Deterministic Middle Intermediate Representation (dMIR) and a hybrid lazy-JIT compilation engine that dynamically adapts optimization levels (O0∼O2) to balance compilation speed and execution efficiency. Beyond Wasm, DTVM further accommodates diverse instruction set architectures (e.g., EVM, RISC-V) through modular adaptation layers, translating their bytecode into the unified dMIR intermediate representation. This enables seamless integration with DTVM’s hybrid lazy-JIT compilation engine, which dynamically optimizes performance while preserving deterministic execution guarantees across heterogeneous environments. The key contributions including: 1). The framework achieves up to 2× acceleration over evmone in dominant Ethereum contract (e.g. ERC20/721/1155) execution and reduces fibonacci computation latency by 11.8∼40.5% compared to Wasm based VMs, while ensuring cross-architecture deterministic execution through hardware-enforced memory isolation and standardized trap handling. 2). A novel trampoline hot-switch mechanism enables sub-millisecond (0.95ms) post-deployment invocation times, outperforming up to about 23× in compilation and invocation efficiency comparing to the state-of-the-art Wasm (Wasmtime). 3). The solution supports multi-language development (Solidity, C++, Rust, java, Go, and AssemblyScript) through unified bytecode conversion while maintaining EVM ABI compatibility for seamless invocation. Additionally, it reduces machine code object sizes by 30.0∼72.6% compared to alternatives, coupled with a minimized Trusted Computing Base (69.5KLoC, 48% of Wasmtime) for secure execution environments. 4). DTV
The increasing complexity of software supply chains and the rise of supply chain attacks have elevated concerns around software integrity. Users and stakeholders face significant challenges in validating that a given ...
详细信息
Over the years, static taint analysis emerged as the analysis of choice to detect some of the most common web application vulnerabilities, such as SQL injection (SQLi) and cross-site scripting (XSS) [OWA]. Furthermore...
详细信息
A Software Bill of Materials (SBOM) is becoming an essential tool for effective software dependency management. An SBOM is a list of components used in software, including details such as component names, versions, an...
详细信息
When writing source code, programmers have varying levels of freedom when it comes to the creation and use of identifiers. Do they habitually use the same identifiers, names that are different to those used by others?...
详细信息
This paper presents Megadiff, a dataset of source code diffs. It focuses on java, with strict inclusion criteria based on commit message and diff size. Megadiff contains 663 029 java diffs that can be used for researc...
详细信息
We study the evolution and impact of bloated dependencies in a single software ecosystem: java/Maven. Bloated dependencies are third-party libraries that are packaged in the application binary but are not needed to ru...
详细信息
When a runtime exception occurs during the operation or performance test of a java Web application, it can not be confirmed detailed behavior and values until the occurrence of an exception from the limited log, there...
详细信息
暂无评论