The CHERI capability model: Revisiting RISC in an age of risk

J Woodruff, RNM Watson, D Chisnall… - ACM SIGARCH …, 2014 - dl.acm.org
Motivated by contemporary security challenges, we reevaluate and refine capability-based
addressing for the RISC era. We present CHERI, a hybrid capability model that extends the …

[PDF][PDF] The Soot framework for Java program analysis: a retrospective

P Lam, E Bodden, O Lhoták… - Cetus Users and …, 2011 - pdfs.semanticscholar.org
You can write a compiler pass extending Soot, as either a BodyTransformer, for a
intraprocedural analysis; or SceneTransformer, for a whole-program analysis. You choose …

What is keeping my phone awake? Characterizing and detecting no-sleep energy bugs in smartphone apps

A Pathak, A Jindal, YC Hu, SP Midkiff - Proceedings of the 10th …, 2012 - dl.acm.org
Despite their immense popularity in recent years, smartphones are and will remain severely
limited by their battery life. Preserving this critical resource has driven smartphone OSes to …

Design of the Java HotSpot™ client compiler for Java 6

T Kotzmann, C Wimmer, H Mössenböck… - ACM Transactions on …, 2008 - dl.acm.org
Version 6 of Sun Microsystems' Java HotSpot™ VM ships with a redesigned version of the
client just-in-time compiler that includes several research results of the last years. The client …

Dynamic metrics for Java

B Dufour, K Driesen, L Hendren… - Proceedings of the 18th …, 2003 - dl.acm.org
In order to perform meaningful experiments in optimizing compilation and run-time system
design, researchers usually rely on a suite of benchmark programs of interest to the …

Array bounds check elimination for the Java HotSpot™ client compiler

T Würthinger, C Wimmer, H Mössenböck - Proceedings of the 5th …, 2007 - dl.acm.org
Whenever an array element is accessed, Java virtual machines execute a compare
instruction to ensure that the index value is within the valid bounds. This reduces the …

Optimization coaching: optimizers learn to communicate with programmers

V St-Amour, S Tobin-Hochstadt… - Proceedings of the ACM …, 2012 - dl.acm.org
Optimizing compilers map programs in high-level languages to high-performance target
language code. To most programmers, such a compiler constitutes an impenetrable black …

Wpbound: Enforcing spatial memory safety efficiently at runtime with weakest preconditions

D Ye, Y Su, Y Sui, J Xue - 2014 IEEE 25th International …, 2014 - ieeexplore.ieee.org
Spatial errors (eg, Buffer overflows) continue to be one of the dominant threats to software
reliability and security in C/C++ programs. Presently, the software industry typically enforces …

Optimistic loop optimization

J Doerfert, T Grosser, S Hack - 2017 IEEE/ACM International …, 2017 - ieeexplore.ieee.org
Compilers use static analyses to justify program optimizations. As every optimization must
preserve the semantics of the original program, static analysis typically fall-back to …

[PDF][PDF] CellVM: A homogeneous virtual machine runtime system for a heterogeneous single-chip multiprocessor

A Noll, A Gal, M Franz - Workshop on Cell Systems and Applications, 2008 - Citeseer
We present a runtime environment that implements a Java Virtual Machine by co-execution
between the different functional units of the heterogeneous Cell multiprocessing platform …