Power saving code optimization based on using the power controllable components of CPU
The article is devoted to solving the problem of reducing the power consumption during the code execution. The object of research is a technique of disabling individual components of the central processing unit. The theoretical aspects of source code modifications are considered in the article for i...
| Published in: | Труды Института системного программирования РАН |
|---|---|
| Main Authors: | I. I. Karetin, V. A. Makarov |
| Format: | Article |
| Language: | English |
| Published: |
Russian Academy of Sciences, Ivannikov Institute for System Programming
2018-10-01
|
| Subjects: | |
| Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/1073 |
Similar Items
Format recovery
by: A. I. Getman, et al.
Published: (2018-10-01)
by: A. I. Getman, et al.
Published: (2018-10-01)
Building security predicates for some types of vulnerabilities
by: A. N. Fedotov, et al.
Published: (2018-10-01)
by: A. N. Fedotov, et al.
Published: (2018-10-01)
Platform for interprocedural static analysis of binary code
by: H. K. Aslanyan
Published: (2018-12-01)
by: H. K. Aslanyan
Published: (2018-12-01)
Next generation intermediate representations for binary code analysis
by: M. A. Solovev, et al.
Published: (2019-02-01)
by: M. A. Solovev, et al.
Published: (2019-02-01)
Platform-independent and scalable tool for binary code clone detection
by: H. K. Aslanyan, et al.
Published: (2018-10-01)
by: H. K. Aslanyan, et al.
Published: (2018-10-01)
Dynamic detection of Use After Free bugs
by: S. A. Asryan, et al.
Published: (2018-10-01)
by: S. A. Asryan, et al.
Published: (2018-10-01)
Software deobfuscation methods: analysis and implementation
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01)
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01)
Raising the level of abstraction of program execution trace
by: A. G. Nazarov, et al.
Published: (2018-10-01)
by: A. G. Nazarov, et al.
Published: (2018-10-01)
Dynamic analysis of virtualization- and dispatching-obfuscated applications
by: M. G. Bakulin, et al.
Published: (2018-10-01)
by: M. G. Bakulin, et al.
Published: (2018-10-01)
Recovery of binary data structures from program traces
by: A. I. Avetisyan, et al.
Published: (2018-10-01)
by: A. I. Avetisyan, et al.
Published: (2018-10-01)
On Some Limitations of Information Flow Tracking in Full-system Emulators
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
Vulnerabilities Detection via Static Taint Analysis
by: Nikita Vladimirovitch Chimtchik, et al.
Published: (2019-09-01)
by: Nikita Vladimirovitch Chimtchik, et al.
Published: (2019-09-01)
Input data generation for reaching specific function in program by iterative dynamic analysis
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
Analysis of program changes nature and searching for unpatched code fragments
by: Mariam Seropovna Arutunian, et al.
Published: (2019-04-01)
by: Mariam Seropovna Arutunian, et al.
Published: (2019-04-01)
Model of data handling for in-depth analysis of network traffic
by: A. I. Get'man, et al.
Published: (2018-10-01)
by: A. I. Get'man, et al.
Published: (2018-10-01)
Dynamic program analysis for error detection using goal-seeking input data generation
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Application of software emulators for the binary code analysis
by: P. M. Dovgalyuk, et al.
Published: (2018-10-01)
by: P. M. Dovgalyuk, et al.
Published: (2018-10-01)
Methods and software tools for combined binary code analysis
by: V. A. Padaryan, et al.
Published: (2018-10-01)
by: V. A. Padaryan, et al.
Published: (2018-10-01)
Applying dynamic analysis to programs running in interpreted environments
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Technique The Instrumentation A Code And Optimization of code lines in modeling phase transitions on the programming language C++
by: E. V. Palchevsky, et al.
Published: (2018-10-01)
by: E. V. Palchevsky, et al.
Published: (2018-10-01)
Applying Java bytecode static instrumentation for software dynamic analysis
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
An approach of reachability determination for static analysis defects with help of dynamic symbolic execution
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
by: A. Y. Gerasimov, et al.
Published: (2018-10-01)
Analyzing C/C++ code entities and relations for program understanding
by: A. . Belevantsev, et al.
Published: (2018-10-01)
by: A. . Belevantsev, et al.
Published: (2018-10-01)
Avalanche: Using dynamic analysis for automatic defect detection in programs based on network sockets
by: Ildar Isaev, et al.
Published: (2018-10-01)
by: Ildar Isaev, et al.
Published: (2018-10-01)
Buffer overrun detection method in binary code
by: V. V. Kaushan
Published: (2018-10-01)
by: V. V. Kaushan
Published: (2018-10-01)
Memory violation detection method in binary code
by: V. V. Kaushan, et al.
Published: (2018-10-01)
by: V. V. Kaushan, et al.
Published: (2018-10-01)
The year of epoch of changes for the database technology
by: S. D. Kuznetsov
Published: (2018-10-01)
by: S. D. Kuznetsov
Published: (2018-10-01)
Survey on static program analysis results refinement approaches
by: A. Y. Gerasimov
Published: (2018-10-01)
by: A. Y. Gerasimov
Published: (2018-10-01)
Source code transformation and automatic correction of defects with KAST language
by: N. L. Lugovskoy, et al.
Published: (2018-10-01)
by: N. L. Lugovskoy, et al.
Published: (2018-10-01)
Interprocedural taint analysis for LLVM-bitcode
by: V. K. Koshelev, et al.
Published: (2018-10-01)
by: V. K. Koshelev, et al.
Published: (2018-10-01)
Using ABI for virtual machines introspection
by: N. I. Fursova, et al.
Published: (2018-10-01)
by: N. I. Fursova, et al.
Published: (2018-10-01)
Detecting race conditions in Java programs using dynamic analysis
by: M. . Ermakov, et al.
Published: (2018-10-01)
by: M. . Ermakov, et al.
Published: (2018-10-01)
Automatic concurrency defect detection for Android applications
by: V. P. Ivannikov, et al.
Published: (2018-10-01)
by: V. P. Ivannikov, et al.
Published: (2018-10-01)
The refactoring approach used in Klocwork Insight toolkit
by: N. L. Lugovskoy
Published: (2018-10-01)
by: N. L. Lugovskoy
Published: (2018-10-01)
Static analyzer Svace for finding of defects in program source code
by: V. P. Ivannikov, et al.
Published: (2018-10-01)
by: V. P. Ivannikov, et al.
Published: (2018-10-01)
Using static analysis for finding security vulnerabilities and critical errors in source code
by: Arutyun Avetisyan, et al.
Published: (2018-10-01)
by: Arutyun Avetisyan, et al.
Published: (2018-10-01)
Dynamic analysis of programs with graphical user interface based on symbolic execution
by: S. P. Vartanov, et al.
Published: (2018-10-01)
by: S. P. Vartanov, et al.
Published: (2018-10-01)
Applying iterative dynamic analysis to programs with graphical user interface
by: M. K. Ermakov, et al.
Published: (2018-10-01)
by: M. K. Ermakov, et al.
Published: (2018-10-01)
Dynamic Java program analysis using virtual machine modification
by: M. . Ermakov, et al.
Published: (2018-10-01)
by: M. . Ermakov, et al.
Published: (2018-10-01)
Комплексная система защиты от уязвимостей, основанных на возвратно-ориентированном программировании
by: Ivan Lubkin, et al.
Published: (2022-03-01)
by: Ivan Lubkin, et al.
Published: (2022-03-01)
Similar Items
-
Format recovery
by: A. I. Getman, et al.
Published: (2018-10-01) -
Building security predicates for some types of vulnerabilities
by: A. N. Fedotov, et al.
Published: (2018-10-01) -
Platform for interprocedural static analysis of binary code
by: H. K. Aslanyan
Published: (2018-12-01) -
Next generation intermediate representations for binary code analysis
by: M. A. Solovev, et al.
Published: (2019-02-01) -
Platform-independent and scalable tool for binary code clone detection
by: H. K. Aslanyan, et al.
Published: (2018-10-01)
