-
161
Accelerating Irregular Applications with Pipeline Parallelism
Published 2022“…Irregular applications have frequent data-dependent memory accesses and control flow. They arise in many emerging and important domains, including sparse deep learning, graph analytics, and database processing. …”
Get full text
Thesis -
162
-
163
Data Delivery Implementation on River Flow Control System Prototype Using HTTP
Published 2023-12-01“…In this research, the process of sending data from the sensor node (Control Flow System) to the master node (Control station) to the cloud server to be displayed on a website. …”
Get full text
Article -
164
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits
Published 2015-10-01“…By separating control information from the data stack, we can protect sensitive pointers of a program’s control flow from being overwritten by buffer overflows. …”
Get full text
Article -
165
Translating Workflow Nets to Process Trees: An Algorithmic Approach
Published 2020-11-01“…A process tree is a (mathematical) tree-based model of a process, in which internal vertices represent behavioral control-flow relations and leaves represent process activities. …”
Get full text
Article -
166
Execution Model Enforcement Via Program Shepherding
Published 2023“…Program shepherding monitors control flow in order to enforce a security policy. …”
Get full text
-
167
Control Jujutsu
Published 2018“…Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking memory corruption attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
168
-
169
Dependence flow graph for analysis of aspect-oriented programs
Published 2014“…In general, program analysis is performed either based on control flow graph or dependence graph. However, in the case of aspect-oriented programming (AOP), control flow graph (CFG) or dependence graph (DG) are not enough to model the properties of Aspect-oriented (AO) programs. …”
Get full text
Article -
170
-
171
Strcmp-like Function Identification Method Based on Data Flow Feature Matching
Published 2022-09-01“…Embedded devices have become visible everywhere,and they are used in a range of security-critical and privacy-sensitive applications.However,recent studies show that many embedded devices have backdoor,of which hard-coded backdoor(password backdoor) is the most common.In the triggering process of password backdoor,strcmp-like functions are necessary and important absolutely.However,the current identification of strcmp-like functions mainly relies on function signature and control flow feature matching.The former can't recognize user-defined strcmp-like functions,and the identify effect is greatly affected by the compile environment.The latter has high false positive rate and false negative rate.To solve the above problems,this paper proposes a novel strcmp-like recognition technology CMPSeek.This method builds a model for strcmp-like function identification based on the analysis of control flow and data flow characteristics,which is used to identify strcmp-like functions in binary programs,and is suitable for stripped binary programs.Furthermore,ARM,MIPS,PPC and x86/64 instruction sets are supported by converting binary codes to the intermediate language representation VEX IR codes.Experimental results show that CMPSeek has better results in accuracy rate and recall rate than FLIRT and SaTC in the absence of source code,function name and other information.…”
Get full text
Article -
172
Ryazan Universities Networking Cooperation: The Theory and Experience of the Organization
Published 2019-07-01“…The existing results are given in the article. The control-flow chart of the subprogram – client work and the control-flow chart of the subprogram – server work are shown in pictures.…”
Get full text
Article -
173
Online incremental updating for model enhancement based on multi-perspective trusted intervals
Published 2022-12-01“…First, analyse the reference model to construct multi-perspective trusted interval constraints in the offline stage. From a control-flow perspective, the behavioural relationships between activities are researched using a deep clustering approach. …”
Get full text
Article -
174
A framework for multi-perspective process mining into a BPMN process model
Published 2022-08-01“…When process mining is extended far beyond discovering the control-flow models to capture additional perspectives; roles, bottlenecks, amounts of time passed, guards, and routing probabilities in the process can be identified. …”
Get full text
Article -
175
-
176
Effectiveness analysis of Aspect-Oriented Dependence Flow Graph as an intermediate representation tool
Published 2018“…Graph-based representations of programs such as control flow graph or dependence graph have been used to support program analysis tasks such as program comprehension and software maintenance. …”
Get full text
Article -
177
BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary
Published 2019-01-01“…At present, the solution to this problem mostly calculates code similarities by generating a CFG (control flow graph) from binary code, but due to the choice of architecture, OS (operating system) or compilation options, the same source code will be compiled into different assembly codes. …”
Get full text
Article -
178
Conceptual-level workflow modeling of scientific experiments using NMR as a case study
Published 2007-01-01“…In addition, the models provide an accurate visual description of the control flow for conducting biomolecular analysis using NMR spectroscopy experiment.…”
Get full text
Article -
179
A tool for automatic verification of post-transaction input error handling
Published 2008“…This research project is to experiment on the proposed approach and to develop a prototype tool to transform the source codes for database transactions into control flow graphs so that the proposed approach can be applied to verify if the database transactions are correctable.…”
Get full text
Thesis -
180
RBF-MLMR: A Multi-Label Metamorphic Relation Prediction Approach Using RBF Neural Network
Published 2017-01-01“…First, RBF-MLMR uses state-of-the-art soot analysis tool to generate control flow graph and corresponds labels from the source codes of programs. …”
Get full text
Article