Learn More
Computer security is the protection of the resources of a computer against events that can result in loss of availability, unauthorized access, or modification of data. The techniques devised to protect computers from these attacks are general purpose in nature and therefore cannot directly enforce security that has no universal definition. The high degree(More)
Information $ow predicates are properties of sets of traces and therefore cannot be handled under the Alp-ern-Schneider framework and the Abadi-Lnmport Composition Principle. McLean proposed a theory in iMCL941 to investigate the composition properties of these predicates and derived a partial order on them. In this paper we present an alternate framework(More)
Code density is an important issue in memory constrained processors. Echo Technology (ET) can be employed to replace a repeating code sequence with a single ECHO instruction. Its usefulness for code size reduction has been demonstrated on JAVA bytecode and RISC binaries. In this paper, we evaluate its effectiveness for IA32 binaries. Common perception(More)
Code density is an important issue in memory constrained systems. Some RISC processor, e.g. the THUMB extension in the ARM processor, supports aggressive code size reduction even at the cost of significant performance loss. In this paper, we develop an algorithm that utilizes a set of novel variable length Echo instructions and evaluate its effectiveness(More)
The size and speed of first-level caches and SRAMs of embedded processors continue to increase in response to demands for higher performance. In power-sensitive devices like PDAs and cellular handsets, decreasing power consumption while increasing performance is desirable. Contemporary caches typically exploit locality in memory access patterns but do not(More)
  • 1