Coz finding code that counts with causal profiling
C Curtsinger, ED Berger - Proceedings of the 25th Symposium on …, 2015 - dl.acm.org
Improving performance is a central concern for software developers. To locate optimization
opportunities, developers rely on software profilers. However, these profilers only report …
opportunities, developers rely on software profilers. However, these profilers only report …
Time-predictable execution of multithreaded applications on multicore systems
In multicore systems, contention for access to main memory between application threads
complicates timing analysis and may lead to pessimistic bounds on execution time. This is …
complicates timing analysis and may lead to pessimistic bounds on execution time. This is …
Survey of automated vulnerability detection and exploit generation techniques in cyber reasoning systems
TN Brooks - Intelligent Computing: Proceedings of the 2018 …, 2019 - Springer
Software is everywhere, from mission critical systems such as industrial power stations,
pacemakers and even household appliances. This growing dependence on technology and …
pacemakers and even household appliances. This growing dependence on technology and …
ArMOR: Defending against memory consistency model mismatches in heterogeneous architectures
Architectural heterogeneity is increasing: numerous products and studies have proven the
benefits of combining cores and accelerators with varying ISAs into a single system …
benefits of combining cores and accelerators with varying ISAs into a single system …
Analyzing system performance with probabilistic performance annotations
To understand, debug, and predict the performance of complex software systems, we
develop the concept of probabilistic performance annotations. In essence, we annotate …
develop the concept of probabilistic performance annotations. In essence, we annotate …
Scalable, accurate multicore simulation in the 1000-core era
We present HORNET, a parallel, highly configurable, cycle-level multicore simulator based
on an ingress-queued worm-hole router NoC architecture. The parallel simulation engine …
on an ingress-queued worm-hole router NoC architecture. The parallel simulation engine …
Fast non-intrusive memory reclamation for highly-concurrent data structures
Current memory reclamation mechanisms for highly-concurrent data structures present an
awkward trade-off. Techniques such as epoch-based reclamation perform well when all …
awkward trade-off. Techniques such as epoch-based reclamation perform well when all …
{wPerf}: Generic {Off-CPU} Analysis to Identify Bottleneck Waiting Events
This paper tries to identify waiting events that limit the maximal throughput of a multi-
threaded application. To achieve this goal, we not only need to understand an event's …
threaded application. To achieve this goal, we not only need to understand an event's …
A formal framework for program anomaly detection
Program anomaly detection analyzes normal program behaviors and discovers aberrant
executions caused by attacks, misconfigurations, program bugs, and unusual usage …
executions caused by attacks, misconfigurations, program bugs, and unusual usage …
Using memory access traces to map threads and data on hierarchical multi-core platforms
In parallel programs, the tasks of a given application must cooperate in order to accomplish
the required computation. However, the communication time between the tasks may be …
the required computation. However, the communication time between the tasks may be …