Compile the Code Instrumentation Technique for Selective Debugging of Optimizing Transformations
The paper addresses the problem of an optimizing compiler debugging. A new method for compile-time instrumentation is presented as an efficient approach to improve reliability of optimizing transformations implemented in the compiler. The principal feature of the method is that it aims at debugging...
| Published in: | Труды Института системного программирования РАН |
|---|---|
| Main Author: | D. A. Maksimenkov |
| Format: | Article |
| Language: | English |
| Published: |
Russian Academy of Sciences, Ivannikov Institute for System Programming
2018-10-01
|
| Subjects: | |
| Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/938 |
Similar Items
Technique The Instrumentation A Code And Optimization of code lines in modeling phase transitions on the programming language C++
by: E. V. Palchevsky, et al.
Published: (2018-10-01)
by: E. V. Palchevsky, et al.
Published: (2018-10-01)
Stealth debugging of programs in Qemu emulator with WinDbg debugger
by: M. A. Abakumov, et al.
Published: (2018-10-01)
by: M. A. Abakumov, et al.
Published: (2018-10-01)
Methods to improve reverse debugging performance
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
by: M. A. Klimushenkova, et al.
Published: (2018-10-01)
Analysis of program changes nature and searching for unpatched code fragments
by: Mariam Seropovna Arutunian, et al.
Published: (2019-04-01)
by: Mariam Seropovna Arutunian, et al.
Published: (2019-04-01)
Automatic uninitialized value usage detection during full-system emulation
by: N. A. Belov
Published: (2018-10-01)
by: N. A. Belov
Published: (2018-10-01)
Application of software emulators for the binary code analysis
by: P. M. Dovgalyuk, et al.
Published: (2018-10-01)
by: P. M. Dovgalyuk, et al.
Published: (2018-10-01)
Комплексная система защиты от уязвимостей, основанных на возвратно-ориентированном программировании
by: Ivan Lubkin, et al.
Published: (2022-03-01)
by: Ivan Lubkin, et al.
Published: (2022-03-01)
Platform-independent and scalable tool for binary code clone detection
by: H. K. Aslanyan, et al.
Published: (2018-10-01)
by: H. K. Aslanyan, et al.
Published: (2018-10-01)
Survey of Just-in-Time Query Compilation Methods
by: E. Y. Sharygin, et al.
Published: (2018-10-01)
by: E. Y. Sharygin, et al.
Published: (2018-10-01)
Automatic clone detection for refactoring
by: N. G. Zetser
Published: (2018-10-01)
by: N. G. Zetser
Published: (2018-10-01)
Source code transformation and automatic correction of defects with KAST language
by: N. L. Lugovskoy, et al.
Published: (2018-10-01)
by: N. L. Lugovskoy, et al.
Published: (2018-10-01)
Dynamic detection of Use After Free bugs
by: S. A. Asryan, et al.
Published: (2018-10-01)
by: S. A. Asryan, et al.
Published: (2018-10-01)
Code switch problem and language contacts
by: J N Ebzeeva, et al.
Published: (2012-09-01)
by: J N Ebzeeva, et al.
Published: (2012-09-01)
Platform for interprocedural static analysis of binary code
by: H. K. Aslanyan
Published: (2018-12-01)
by: H. K. Aslanyan
Published: (2018-12-01)
Incremental source code analysis for C/C++ languages
by: V. O. Savitsky, et al.
Published: (2018-10-01)
by: V. O. Savitsky, et al.
Published: (2018-10-01)
Analyzing C/C++ code entities and relations for program understanding
by: A. . Belevantsev, et al.
Published: (2018-10-01)
by: A. . Belevantsev, et al.
Published: (2018-10-01)
Using Deterministic Replay for Software Fault Injection
by: P. M. Dovgalyuk, et al.
Published: (2018-10-01)
by: P. M. Dovgalyuk, et al.
Published: (2018-10-01)
The technique of probability reference distribution law finding at кеу sequence statistical testing
by: N. G. Kiyevets, et al.
Published: (2019-06-01)
by: N. G. Kiyevets, et al.
Published: (2019-06-01)
Testing of Operating Systems
by: E. A. Gerlits, et al.
Published: (2018-10-01)
by: E. A. Gerlits, et al.
Published: (2018-10-01)
Power saving code optimization based on using the power controllable components of CPU
by: I. I. Karetin, et al.
Published: (2018-10-01)
by: I. I. Karetin, et al.
Published: (2018-10-01)
TLS clients testing
by: A. V. Nikeshin, et al.
Published: (2018-10-01)
by: A. V. Nikeshin, et al.
Published: (2018-10-01)
Defect Detection: Combining Bounded Model Checking and Code Contracts
by: Marat Akhin, et al.
Published: (2013-01-01)
by: Marat Akhin, et al.
Published: (2013-01-01)
OF PRESENTING THE RESULTS OF NETWORK TRAFFIC ANALYSIS
by: A. I. Get'man, et al.
Published: (2018-10-01)
by: A. I. Get'man, et al.
Published: (2018-10-01)
Evaluating a number of cache coherency misses based on a statistical model
by: Evgeny Velesevich
Published: (2018-10-01)
by: Evgeny Velesevich
Published: (2018-10-01)
Software deobfuscation methods: analysis and implementation
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01)
by: Sh. F. Kurmangaleev, et al.
Published: (2018-10-01)
Особенности Ванских землетрясений 1976 и 2011 гг., роевая сейсмичность и поле поглощения S-волн
by: О.И. Аптикаева
Published: (2019-10-01)
by: О.И. Аптикаева
Published: (2019-10-01)
Method of selecting between manual and automated testing based on the software product features
by: EkaterinaY. . Galimova, et al.
Published: (2016-12-01)
by: EkaterinaY. . Galimova, et al.
Published: (2016-12-01)
Automation of conformance testing for communication protocols
by: Nikolay Pakulin, et al.
Published: (2018-10-01)
by: Nikolay Pakulin, et al.
Published: (2018-10-01)
Building Modular Real-time software from Unified Component Model
by: K. A. Mallachiev, et al.
Published: (2018-10-01)
by: K. A. Mallachiev, et al.
Published: (2018-10-01)
The refactoring approach used in Klocwork Insight toolkit
by: N. L. Lugovskoy
Published: (2018-10-01)
by: N. L. Lugovskoy
Published: (2018-10-01)
Dynamic analysis of virtualization- and dispatching-obfuscated applications
by: M. G. Bakulin, et al.
Published: (2018-10-01)
by: M. G. Bakulin, et al.
Published: (2018-10-01)
Vulnerabilities Detection via Static Taint Analysis
by: Nikita Vladimirovitch Chimtchik, et al.
Published: (2019-09-01)
by: Nikita Vladimirovitch Chimtchik, et al.
Published: (2019-09-01)
Configurable system call tracer in QEMU emulator
by: A. V. Ivanov, et al.
Published: (2018-10-01)
by: A. V. Ivanov, et al.
Published: (2018-10-01)
Рекомендации по применению фармакогенетического тестирования в клинической практике
Published: (2018-06-01)
Published: (2018-06-01)
Optimization of Calculating Invariants in Petri Nets to Support the Creation of Integration Testing Scenarios
by: M. G. Dorrer, et al.
Published: (2012-01-01)
by: M. G. Dorrer, et al.
Published: (2012-01-01)
Conformance testing based on a state relation
by: Igor B. Burdonov, et al.
Published: (2018-10-01)
by: Igor B. Burdonov, et al.
Published: (2018-10-01)
Conformance testing of Extensible Authentication Protocol implementations
by: A. V. Nikeshin, et al.
Published: (2019-02-01)
by: A. V. Nikeshin, et al.
Published: (2019-02-01)
Approach to analyzing executable code based on the software architecture recovery
by: D. S. Kononov
Published: (2018-12-01)
by: D. S. Kononov
Published: (2018-12-01)
Avalanche: Using dynamic analysis for automatic defect detection in programs based on network sockets
by: Ildar Isaev, et al.
Published: (2018-10-01)
by: Ildar Isaev, et al.
Published: (2018-10-01)
Тестирование специальной подготовленности теннисистов: зарубежный опыт
by: Леонід Прокопович Сергієнко [Leonid Serhiyenko]
Published: (2013-12-01)
by: Леонід Прокопович Сергієнко [Leonid Serhiyenko]
Published: (2013-12-01)
Similar Items
-
Technique The Instrumentation A Code And Optimization of code lines in modeling phase transitions on the programming language C++
by: E. V. Palchevsky, et al.
Published: (2018-10-01) -
Stealth debugging of programs in Qemu emulator with WinDbg debugger
by: M. A. Abakumov, et al.
Published: (2018-10-01) -
Methods to improve reverse debugging performance
by: M. A. Klimushenkova, et al.
Published: (2018-10-01) -
Analysis of program changes nature and searching for unpatched code fragments
by: Mariam Seropovna Arutunian, et al.
Published: (2019-04-01) -
Automatic uninitialized value usage detection during full-system emulation
by: N. A. Belov
Published: (2018-10-01)
