Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- tutorialOctober 2016
Program Anomaly Detection: Methodology and Practices
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1853–1854https://doi.org/10.1145/2976749.2976750This tutorial will present an overview of program anomaly detection, which analyzes normal program behaviors and discovers aberrant executions caused by attacks, misconfigurations, program bugs, and unusual usage patterns. It was first introduced as an ...
- extended-abstractOctober 2015
Infection size as a measure of bug severity
WODA 2015: Proceedings of the 13th International Workshop on Dynamic AnalysisPages 31–32https://doi.org/10.1145/2823363.2823370A simple bug in a program can influence a large part of the program execution by spreading throughout the state at runtime. This is known as program infection. The seriousness of bugs is usually measured by studying their external effects. However, ...
- short-paperOctober 2015
SQL for deep dynamic analysis?
WODA 2015: Proceedings of the 13th International Workshop on Dynamic AnalysisPages 2–7https://doi.org/10.1145/2823363.2823365If we develop a new dynamic analysis tool, how should we expose its functionalities? Through an interactive user interface, a DSL, a specific API, or in some other way? In this paper, we discuss how to use an already existing language familiar to most ...
- research-articleSeptember 2015
BLAST: Bytecode-Level Analysis on Sliced Traces
PPPJ '15: Proceedings of the Principles and Practices of Programming on The Java PlatformPages 152–158https://doi.org/10.1145/2807426.2807439BLAST is a framework for deep analysis of Java program executions. It captures the entire information flow of an execution. A BLAST trace represents the space-time history of a program run: It combines space (heap, static, and stack memory locations) ...
- ArticleSeptember 2013
Extracting Threaded Traces in Simulation Environments
NPC 2013: Proceedings of the 10th IFIP International Conference on Network and Parallel Computing - Volume 8147Pages 27–38https://doi.org/10.1007/978-3-642-40820-5_3Instruction traces play an important role in analyzing and understanding the behavior of target applications; however, existing tracing tools are built on specific platforms coupled with excessive reliance on compilers and operating systems. In this ...
- research-articleJuly 2013
Pattern-guided genetic programming
GECCO '13: Proceedings of the 15th annual conference on Genetic and evolutionary computationPages 949–956https://doi.org/10.1145/2463372.2463496Online progress in search and optimization is often hindered by neutrality in the fitness landscape, when many genotypes map to the same fitness value. We propose a method for imposing a gradient on the fitness function of a metaheuristic (in this case, ...
- research-articleJuly 2009
A real-time program trace compressor utilizing double move-to-front method
DAC '09: Proceedings of the 46th Annual Design Automation ConferencePages 738–743https://doi.org/10.1145/1629911.1630102This paper introduces a new unobtrusive and cost-effective method for the capture and compression of program execution traces in real-time, which is based on a double move-to-front transformation. We explore its effectiveness and describe a cost-...
- research-articleJuly 2009
A trace-capable instruction cache for cost efficient real-time program trace compression in SoC
DAC '09: Proceedings of the 46th Annual Design Automation ConferencePages 136–141https://doi.org/10.1145/1629911.1629952This paper presents a novel approach to make the on-chip instruction cache of a SoC to function simultaneously as a regular instruction cache and a real time program trace compressor. This goal is accomplished by exploiting the dictionary feature of the ...
- ArticleDecember 1996
Run-time versus compile-time instruction scheduling in superscalar (RISC) processors: performance and tradeoffs
HIPC '96: Proceedings of the Third International Conference on High-Performance Computing (HiPC '96)Page 215The RISC revolution has spurred the development of processors with increasing degrees of instruction level parallelism (ILP). In order to realize the full potential of these processors, multiple instructions must continuously be issued and executed in a ...
- research-articleJuly 1987
Characterization of branch and data dependencies on programs for evaluating pipeline performance
IEEE Transactions on Computers (ITCO), Volume 36, Issue 7Pages 859–875https://doi.org/10.1109/TC.1987.1676981The nature by which branches and data dependencies generate delays that degrade pipeline performance is investigated in this paper. We show that for the general execution trace, few specific delays can be considered in isolation; rather, the magnitude ...
- surveyFebruary 1975
Speeding up the Synthesis of Programs from Traces
IEEE Transactions on Computers (ITCO), Volume 24, Issue 2Pages 122–136https://doi.org/10.1109/T-C.1975.224180An algorithm is given for synthesizing a computer program from a trace of its behavior. Since the algorithm involves a search, the length of time required to do the synthesis of nontrivial programs can be quite large. Techniques are given for ...