What's in a github star? understanding repository starring practices in a social coding platform
Besides a git-based version control system, GitHub integrates several social coding
features. Particularly, GitHub users can star a repository, presumably to manifest interest or …
features. Particularly, GitHub users can star a repository, presumably to manifest interest or …
SoK: Sanitizing for security
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …
Developers therefore resort to a multi-pronged approach to find security issues before …
Large-scale empirical study of inline assembly on 7.6 million ethereum smart contracts
Being the most popular programming language for develo** Ethereum smart contracts,
Solidity allows using inline assembly to gain fine-grained control. Although many empirical …
Solidity allows using inline assembly to gain fine-grained control. Although many empirical …
Get rid of inline assembly through verification-oriented lifting
Formal methods for software development have made great strides in the last two decades,
to the point that their application in safety-critical embedded software is an undeniable …
to the point that their application in safety-critical embedded software is an undeniable …
Multi-language dynamic taint analysis in a polyglot virtual machine
Dynamic taint analysis is a popular program analysis technique in which sensitive data is
marked as tainted and the propagation of tainted data is tracked in order to determine …
marked as tainted and the propagation of tainted data is tracked in order to determine …
X86-64 instruction usage among c/c++ applications
This paper presents a study of x86-64 instruction usage across 9,337 C/C++ applications
and libraries in the Ubuntu 16.04 GNU/Linux distribution. We present metrics for reasoning …
and libraries in the Ubuntu 16.04 GNU/Linux distribution. We present metrics for reasoning …
Complete spatial safety for C and C++ using CHERI capabilities
A Richardson - 2020 - cl.cam.ac.uk
Lack of memory safety in commonly used systems-level languages such as C and C++
results in a constant stream of new exploitable software vulnerabilities and exploit …
results in a constant stream of new exploitable software vulnerabilities and exploit …
Identifying Source Code File Experts
Background: In software development, the identification of source code file experts is an
important task. Identifying these experts helps to improve software maintenance and …
important task. Identifying these experts helps to improve software maintenance and …
Instruction extension of RV32I and GCC back end for Ascon lightweight cryptography algorithm
Ö Altınay, B Örs - 2021 IEEE International Conference on Omni …, 2021 - ieeexplore.ieee.org
Lightweight cryptography is useful to provide security and privacy in resource constraint
embedded devices. Latency and memory consumption are the key elements in performance …
embedded devices. Latency and memory consumption are the key elements in performance …
Interface compliance of inline assembly: Automatically check, patch and refine
Inline assembly is still a common practice in low-level C programming, typically for efficiency
reasons or for accessing specific hardware resources. Such embedded assembly codes in …
reasons or for accessing specific hardware resources. Such embedded assembly codes in …