The CHERI capability model: Revisiting RISC in an age of risk
Motivated by contemporary security challenges, we reevaluate and refine capability-based
addressing for the RISC era. We present CHERI, a hybrid capability model that extends the …
addressing for the RISC era. We present CHERI, a hybrid capability model that extends the …
[PDF][PDF] The Soot framework for Java program analysis: a retrospective
You can write a compiler pass extending Soot, as either a BodyTransformer, for a
intraprocedural analysis; or SceneTransformer, for a whole-program analysis. You choose …
intraprocedural analysis; or SceneTransformer, for a whole-program analysis. You choose …
What is keeping my phone awake? Characterizing and detecting no-sleep energy bugs in smartphone apps
Despite their immense popularity in recent years, smartphones are and will remain severely
limited by their battery life. Preserving this critical resource has driven smartphone OSes to …
limited by their battery life. Preserving this critical resource has driven smartphone OSes to …
Design of the Java HotSpot™ client compiler for Java 6
T Kotzmann, C Wimmer, H Mössenböck… - ACM Transactions on …, 2008 - dl.acm.org
Version 6 of Sun Microsystems' Java HotSpot™ VM ships with a redesigned version of the
client just-in-time compiler that includes several research results of the last years. The client …
client just-in-time compiler that includes several research results of the last years. The client …
Dynamic metrics for Java
In order to perform meaningful experiments in optimizing compilation and run-time system
design, researchers usually rely on a suite of benchmark programs of interest to the …
design, researchers usually rely on a suite of benchmark programs of interest to the …
Array bounds check elimination for the Java HotSpot™ client compiler
Whenever an array element is accessed, Java virtual machines execute a compare
instruction to ensure that the index value is within the valid bounds. This reduces the …
instruction to ensure that the index value is within the valid bounds. This reduces the …
Optimization coaching: optimizers learn to communicate with programmers
V St-Amour, S Tobin-Hochstadt… - Proceedings of the ACM …, 2012 - dl.acm.org
Optimizing compilers map programs in high-level languages to high-performance target
language code. To most programmers, such a compiler constitutes an impenetrable black …
language code. To most programmers, such a compiler constitutes an impenetrable black …
Wpbound: Enforcing spatial memory safety efficiently at runtime with weakest preconditions
Spatial errors (eg, Buffer overflows) continue to be one of the dominant threats to software
reliability and security in C/C++ programs. Presently, the software industry typically enforces …
reliability and security in C/C++ programs. Presently, the software industry typically enforces …
Optimistic loop optimization
Compilers use static analyses to justify program optimizations. As every optimization must
preserve the semantics of the original program, static analysis typically fall-back to …
preserve the semantics of the original program, static analysis typically fall-back to …
[PDF][PDF] CellVM: A homogeneous virtual machine runtime system for a heterogeneous single-chip multiprocessor
A Noll, A Gal, M Franz - Workshop on Cell Systems and Applications, 2008 - Citeseer
We present a runtime environment that implements a Java Virtual Machine by co-execution
between the different functional units of the heterogeneous Cell multiprocessing platform …
between the different functional units of the heterogeneous Cell multiprocessing platform …