Problems and opportunities in training deep learning software systems: An analysis of variance
Deep learning (DL) training algorithms utilize nondeterminism to improve models' accuracy
and training efficiency. Hence, multiple identical training runs (eg, identical training data …
and training efficiency. Hence, multiple identical training runs (eg, identical training data …
Methodological principles for reproducible performance evaluation in cloud computing
The rapid adoption and the diversification of cloud computing technology exacerbate the
importance of a sound experimental methodology for this domain. This work investigates …
importance of a sound experimental methodology for this domain. This work investigates …
Evaluating fuzz testing
Fuzz testing has enjoyed great success at discovering security critical bugs in real software.
Recently, researchers have devoted significant effort to devising new fuzzing techniques …
Recently, researchers have devoted significant effort to devising new fuzzing techniques …
Enforcing {Forward-Edge}{Control-Flow} integrity in {GCC} & {LLVM}
C Tice, T Roeder, P Collingbourne… - 23rd USENIX security …, 2014 - usenix.org
Constraining dynamic control transfers is a common technique for mitigating software
vulnerabilities. This defense has been widely and successfully used to protect return …
vulnerabilities. This defense has been widely and successfully used to protect return …
Machine learning in compiler optimization
In the last decade, machine-learning-based compilation has moved from an obscure
research niche to a mainstream activity. In this paper, we describe the relationship between …
research niche to a mainstream activity. In this paper, we describe the relationship between …
Scientific benchmarking of parallel computing systems: twelve ways to tell the masses when reporting performance results
Measuring and reporting performance of parallel computers constitutes the basis for
scientific advancement of high-performance computing (HPC). Most scientific reports show …
scientific advancement of high-performance computing (HPC). Most scientific reports show …
HPCTOOLKIT: tools for performance analysis of optimized parallel programs
L Adhianto, S Banerjee, M Fagan… - Concurrency and …, 2010 - Wiley Online Library
HPCToolkit is an integrated suite of tools that supports measurement, analysis, attribution,
and presentation of application performance for both sequential and parallel programs …
and presentation of application performance for both sequential and parallel programs …
Reliable benchmarking: requirements and solutions
Benchmarking is a widely used method in experimental computer science, in particular, for
the comparative evaluation of tools and algorithms. As a consequence, a number of …
the comparative evaluation of tools and algorithms. As a consequence, a number of …
The performance cost of shadow stacks and stack canaries
Control flow defenses against ROP either use strict, expensive, but strong protection against
redirected RET instructions with shadow stacks, or much faster but weaker protections …
redirected RET instructions with shadow stacks, or much faster but weaker protections …
PKRU-Safe: Automatically locking down the heap between safe and unsafe languages
After more than twenty-five years of research, memory safety violations remain one of the
major causes of security vulnerabilities in real-world software. Memory-safe languages, like …
major causes of security vulnerabilities in real-world software. Memory-safe languages, like …