Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Kirill Kononenko"'
Autor:
Kirill Kononenko, Shahrzad Kananizadeh
Publikováno v:
International Journal of Automation and Computing. 15:228-238
Register allocation is a major step for all compilers. Various register allocation algorithms have been developed over the decades. This work describes a new class of rapid register allocation algorithms and presents experimental data on their behavi
Autor:
Shahrzad Kananizadeh, Kirill Kononenko
Publikováno v:
Journal of Grid Computing. 15:395-414
The security of software systems can be threatened by many internal and external threats, including data leakages due to timing channels. Even if developers manage to avoid security threats in the source code or bytecode during development and testin
Autor:
Shahrzad Kananizadeh, Kirill Kononenko
Publikováno v:
International Journal of Information Security. 16:641-651
Information systems face many threats, such as covert channels, which declassify hidden information by, e.g., analyzing the program execution time. Such threats exist at various stages of the execution of instructions. Even if software developers are
Autor:
Kirill Kononenko
Publikováno v:
The Journal of Supercomputing. 72:845-873
Program code is at risk from a wide range of attack vectors that appear at various stages during the compilation and execution of machine code. The existing approaches for detecting threats in program code have many restrictions in terms of their fun
Autor:
Kirill Kononenko
Publikováno v:
S3@MobiCom
The security of hardware-software systems is at risk from a wide range of attack vectors that appear at various stages during the execution of machine code. The existing approaches for repairing software defects have numerous restrictions with respec
Autor:
Kirill Kononenko
Publikováno v:
MobiCom
The security of software systems is threatened by a wide range of attack vectors, such as buffer overflows, insecure information flow, and side channels, which can leak private information, e.g., by monitoring a program's execution time. Even if prog