Sciweavers

102 search results - page 2 / 21
» Compiler Optimizations to Reduce Security Overhead
Sort
View
CGO
2005
IEEE
14 years 2 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
13 years 8 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
14 years 2 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
LCTRTS
1999
Springer
14 years 24 days ago
Effective Exploitation of a Zero Overhead Loop Buffer
A Zero Overhead Loop Buffer (ZOLB) is an architectural feature that is commonly found in DSP processors. This buffer can be viewed as a compiler managed cache that contains a sequ...
Gang-Ryung Uh, Yuhong Wang, David B. Whalley, Sanj...
CGO
2011
IEEE
13 years 4 days ago
A trace-based Java JIT compiler retrofitted from a method-based compiler
—This paper describes our trace-based JIT compiler (trace-JIT) for Java developed from a production-quality method-based JIT compiler (method-JIT). We first describe the design a...
Hiroshi Inoue, Hiroshige Hayashizaki, Peng Wu, Tos...