[PDF][PDF] PERC: Posit enhanced rocket chip
MV Arunkumar, SG Bhairathi… - Proceedings of Fourth …, 2020 - researchgate.net
Precision and performance of arithmetic processing is a known trade-off of a system design.
The IEEE 754 fixed width 32-bit and 64-bit precision arithmetic, while tuned for performance …
The IEEE 754 fixed width 32-bit and 64-bit precision arithmetic, while tuned for performance …
Joint forces for memory safety checking revisited
We present an improved version of the memory safety verification approach implemented in
Symbiotic 5, the winner of the MemSafety category at the Competition on Software …
Symbiotic 5, the winner of the MemSafety category at the Competition on Software …
Symbiotic 6: generating test cases by slicing and symbolic execution
M Chalupa, M Vitovská, T Jašek, M Šimáček… - International Journal on …, 2021 - Springer
Symbiotic is a bug-finding and verification tool that integrates light-weight static analyses
and instrumentation with program slicing and symbolic execution. The techniques are …
and instrumentation with program slicing and symbolic execution. The techniques are …
Application of secret sharing scheme in software watermarking
The software watermarking technique is used to eradicate software piracy that is increasing
widely in this digital world. The programmer can prove his ownership by recovering the …
widely in this digital world. The programmer can prove his ownership by recovering the …
Application of visual cryptography scheme in software watermarking
RM Jacob, K Praveen… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Software watermark is a unique identifier that is embedded in software that can be extracted
later to prove the identity of the owner. Software is prone to threats like piracy, modification …
later to prove the identity of the owner. Software is prone to threats like piracy, modification …
[PDF][PDF] Verification of Memory Safety with Predator and Symbiotic
BT Jašek - is.muni.cz
Symbiotic and Predator are formal verification tools. We evaluate each of those tools on
benchmarks from sv-comp. Our evaluation shows that the tools can benefit from cooperating …
benchmarks from sv-comp. Our evaluation shows that the tools can benefit from cooperating …