TASO: optimizing deep learning computation with automatic generation of graph substitutions

Z Jia, O Padon, J Thomas, T Warszawski… - Proceedings of the 27th …, 2019 - dl.acm.org
Existing deep neural network (DNN) frameworks optimize the computation graph of a DNN
by applying graph transformations manually designed by human experts. This approach …

Alive2: bounded translation validation for LLVM

NP Lopes, J Lee, CK Hur, Z Liu, J Regehr - Proceedings of the 42nd …, 2021 - dl.acm.org
We designed, implemented, and deployed Alive2: a bounded translation validation tool for
the LLVM compiler's intermediate representation (IR). It limits resource consumption by, for …

Tracelet-based code search in executables

Y David, E Yahav - Acm Sigplan Notices, 2014 - dl.acm.org
We address the problem of code search in executables. Given a function in binary form and
a large code base, our goal is to statically find similar functions in the code base. Towards …

Stochastic optimization of floating-point programs with tunable precision

E Schkufza, R Sharma, A Aiken - ACM SIGPLAN Notices, 2014 - dl.acm.org
The aggressive optimization of floating-point computations is an important problem in high-
performance computing. Unfortunately, floating-point instruction sets have complicated …

Semantic program alignment for equivalence checking

B Churchill, O Padon, R Sharma, A Aiken - Proceedings of the 40th ACM …, 2019 - dl.acm.org
We introduce a robust semantics-driven technique for program equivalence checking. Given
two functions we find a trace alignment over a set of concrete executions of both programs …

Similarity of binaries through re-optimization

Y David, N Partush, E Yahav - Proceedings of the 38th ACM SIGPLAN …, 2017 - dl.acm.org
We present a scalable approach for establishing similarity between stripped binaries (with
no debug information). The main challenge in binary similarity, is to establish similarity even …

Unleashing the hidden power of compiler optimization on binary code difference: An empirical study

X Ren, M Ho, J Ming, Y Lei, L Li - Proceedings of the 42nd ACM …, 2021 - dl.acm.org
Hunting binary code difference without source code (ie, binary diffing) has compelling
applications in software security. Due to the high variability of binary code, existing solutions …

Souper: A synthesizing superoptimizer

R Sasnauskas, Y Chen, P Collingbourne… - arXiv preprint arXiv …, 2017 - arxiv.org
If we can automatically derive compiler optimizations, we might be able to sidestep some of
the substantial engineering challenges involved in creating and maintaining a high-quality …

Property directed self composition

R Shemer, A Gurfinkel, S Shoham, Y Vizel - … CAV 2019, New York City, NY …, 2019 - Springer
We address the problem of verifying k-safety properties: properties that refer to k interacting
executions of a program. A prominent way to verify k-safety properties is by self composition …

Enforcing almost-sure reachability in POMDPs

S Junges, N Jansen, SA Seshia - International Conference on Computer …, 2021 - Springer
Abstract Partially-Observable Markov Decision Processes (POMDPs) are a well-known
stochastic model for sequential decision making under limited information. We consider the …