Problems and opportunities in training deep learning software systems: An analysis of variance

HV Pham, S Qian, J Wang, T Lutellier… - Proceedings of the 35th …, 2020 - dl.acm.org
Deep learning (DL) training algorithms utilize nondeterminism to improve models' accuracy
and training efficiency. Hence, multiple identical training runs (eg, identical training data …

Methodological principles for reproducible performance evaluation in cloud computing

AV Papadopoulos, L Versluis, A Bauer… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
The rapid adoption and the diversification of cloud computing technology exacerbate the
importance of a sound experimental methodology for this domain. This work investigates …

Evaluating fuzz testing

G Klees, A Ruef, B Cooper, S Wei, M Hicks - Proceedings of the 2018 …, 2018 - dl.acm.org
Fuzz testing has enjoyed great success at discovering security critical bugs in real software.
Recently, researchers have devoted significant effort to devising new fuzzing techniques …

Enforcing {Forward-Edge}{Control-Flow} integrity in {GCC} & {LLVM}

C Tice, T Roeder, P Collingbourne… - 23rd USENIX security …, 2014 - usenix.org
Constraining dynamic control transfers is a common technique for mitigating software
vulnerabilities. This defense has been widely and successfully used to protect return …

Machine learning in compiler optimization

Z Wang, M O'Boyle - Proceedings of the IEEE, 2018 - ieeexplore.ieee.org
In the last decade, machine-learning-based compilation has moved from an obscure
research niche to a mainstream activity. In this paper, we describe the relationship between …

Scientific benchmarking of parallel computing systems: twelve ways to tell the masses when reporting performance results

T Hoefler, R Belli - Proceedings of the international conference for high …, 2015 - dl.acm.org
Measuring and reporting performance of parallel computers constitutes the basis for
scientific advancement of high-performance computing (HPC). Most scientific reports show …

HPCTOOLKIT: tools for performance analysis of optimized parallel programs

L Adhianto, S Banerjee, M Fagan… - Concurrency and …, 2010 - Wiley Online Library
HPCToolkit is an integrated suite of tools that supports measurement, analysis, attribution,
and presentation of application performance for both sequential and parallel programs …

Reliable benchmarking: requirements and solutions

D Beyer, S Löwe, P Wendler - International Journal on Software Tools for …, 2019 - Springer
Benchmarking is a widely used method in experimental computer science, in particular, for
the comparative evaluation of tools and algorithms. As a consequence, a number of …

The performance cost of shadow stacks and stack canaries

THY Dang, P Maniatis, D Wagner - … of the 10th ACM Symposium on …, 2015 - dl.acm.org
Control flow defenses against ROP either use strict, expensive, but strong protection against
redirected RET instructions with shadow stacks, or much faster but weaker protections …

PKRU-Safe: Automatically locking down the heap between safe and unsafe languages

P Kirth, M Dickerson, S Crane, P Larsen… - Proceedings of the …, 2022 - dl.acm.org
After more than twenty-five years of research, memory safety violations remain one of the
major causes of security vulnerabilities in real-world software. Memory-safe languages, like …