Alive2: bounded translation validation for LLVM

NP Lopes, J Lee, CK Hur, Z Liu, J Regehr - Proceedings of the 42nd …, 2021 - dl.acm.org
We designed, implemented, and deployed Alive2: a bounded translation validation tool for
the LLVM compiler's intermediate representation (IR). It limits resource consumption by, for …

Automatic inference of search patterns for taint-style vulnerabilities

F Yamaguchi, A Maier, H Gascon… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
Taint-style vulnerabilities are a persistent problem in software development, as the recently
discovered" Heart bleed" vulnerability strikingly illustrates. In this class of vulnerabilities …

AStitch: enabling a new multi-dimensional optimization space for memory-intensive ML training and inference on modern SIMT architectures

Z Zheng, X Yang, P Zhao, G Long, K Zhu… - Proceedings of the 27th …, 2022 - dl.acm.org
This work reveals that memory-intensive computation is a rising performance-critical factor in
recent machine learning models. Due to a unique set of new challenges, existing ML …

Debugging reinvented: asking and answering why and why not questions about program behavior

AJ Ko, BA Myers - Proceedings of the 30th international conference on …, 2008 - dl.acm.org
When software developers want to understand the reason for a program's behavior, they
must translate their questions about the behavior into a series of questions about code …

Fault localization via efficient probabilistic modeling of program semantics

M Zeng, Y Wu, Z Ye, Y **ong, X Zhang… - Proceedings of the 44th …, 2022 - dl.acm.org
Testing-based fault localization has been a significant topic in software engineering in the
past decades. It localizes a faulty program element based on a set of passing and failing test …

Fuzzing embedded systems using debug interfaces

M Eisele, D Ebert, C Huth, A Zeller - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Fuzzing embedded systems is hard. Their key components–microcontrollers–are highly
diverse and cannot be easily virtualized; their software may not be changed or instrumented …

Fine-grained information flow analysis and enforcement in a java virtual machine

D Chandra, M Franz - Twenty-Third Annual Computer Security …, 2007 - ieeexplore.ieee.org
We have implemented an information flow framework for the Java virtual machine that
combines static and dynamic techniques to capture not only explicit flows, but also implicit …

From bytecode to JavaScript: the Js_of_ocaml compiler

J Vouillon, V Balat - Software: Practice and Experience, 2014 - Wiley Online Library
We present the design and implementation of a compiler from OCaml bytecode to
JavaScript. The compiler first translates the bytecode into a static single‐assignment …

A new algorithm for identifying loops in decompilation

T Wei, J Mao, W Zou, Y Chen - International Static Analysis Symposium, 2007 - Springer
Loop identification is an essential step of control flow analysis in decompilation. The
Classical algorithm for identifying loops is Tarjan's interval-finding algorithm, which is …

Task-specific visual cues for improving process model understanding

R Petrusel, J Mendling, HA Reijers - Information and Software Technology, 2016 - Elsevier
Context Business process models support various stakeholders in managing business
processes and designing process-aware information systems. In order to make effective use …