Coz finding code that counts with causal profiling

C Curtsinger, ED Berger - Proceedings of the 25th Symposium on …, 2015 - dl.acm.org
Improving performance is a central concern for software developers. To locate optimization
opportunities, developers rely on software profilers. However, these profilers only report …

Time-predictable execution of multithreaded applications on multicore systems

A Alhammad, R Pellizzoni - 2014 Design, Automation & Test in …, 2014 - ieeexplore.ieee.org
In multicore systems, contention for access to main memory between application threads
complicates timing analysis and may lead to pessimistic bounds on execution time. This is …

Survey of automated vulnerability detection and exploit generation techniques in cyber reasoning systems

TN Brooks - Intelligent Computing: Proceedings of the 2018 …, 2019 - Springer
Software is everywhere, from mission critical systems such as industrial power stations,
pacemakers and even household appliances. This growing dependence on technology and …

Scalable, accurate multicore simulation in the 1000-core era

M Lis, P Ren, MH Cho, KS Shim… - (IEEE ISPASS) IEEE …, 2011 - ieeexplore.ieee.org
We present HORNET, a parallel, highly configurable, cycle-level multicore simulator based
on an ingress-queued worm-hole router NoC architecture. The parallel simulation engine …

ArMOR: Defending against memory consistency model mismatches in heterogeneous architectures

D Lustig, C Trippel, M Pellauer… - Proceedings of the 42nd …, 2015 - dl.acm.org
Architectural heterogeneity is increasing: numerous products and studies have proven the
benefits of combining cores and accelerators with varying ISAs into a single system …

Fast non-intrusive memory reclamation for highly-concurrent data structures

D Dice, M Herlihy, A Kogan - Proceedings of the 2016 ACM SIGPLAN …, 2016 - dl.acm.org
Current memory reclamation mechanisms for highly-concurrent data structures present an
awkward trade-off. Techniques such as epoch-based reclamation perform well when all …

Analyzing system performance with probabilistic performance annotations

D Rogora, A Carzaniga, A Diwan, M Hauswirth… - Proceedings of the …, 2020 - dl.acm.org
To understand, debug, and predict the performance of complex software systems, we
develop the concept of probabilistic performance annotations. In essence, we annotate …

Function call interception techniques

P Kang - Software: Practice and Experience, 2018 - Wiley Online Library
Function call interception (FCI), or method call interception (MCI) in the object‐oriented
programming domain, is a technique of intercepting function calls at program runtime …

Using memory access traces to map threads and data on hierarchical multi-core platforms

EHM da Cruz, MAZ Alves, A Carissimi… - … on Parallel and …, 2011 - ieeexplore.ieee.org
In parallel programs, the tasks of a given application must cooperate in order to accomplish
the required computation. However, the communication time between the tasks may be …

{wPerf}: Generic {Off-CPU} Analysis to Identify Bottleneck Waiting Events

F Zhou, Y Gan, S Ma, Y Wang - 13th USENIX Symposium on Operating …, 2018 - usenix.org
This paper tries to identify waiting events that limit the maximal throughput of a multi-
threaded application. To achieve this goal, we not only need to understand an event's …