摘要:
A method for detecting problems caused by access to incompletely initialized data storage in assembler programs includes generating an internal representation of control flow of the source code of the assembler program including nodes for every statement found in the source code and a directed edge for every possible flow of control between the nodes. The method also includes: attributing data attributes to the nodes and/or the edges, wherein the data attributes are used to store the information how many bits within the data storage can be guaranteed to be initialized; applying a data-flow analysis method to the internal representation of the control flow of the source code for determining how many bits of the data storage can be guaranteed to be initialized; checking for each node whether the instruction reads more bits than are guaranteed to be initialized; and generating one or more error messages responsive to the problem.
摘要:
The present invention relates to the field of computer technology, and relates in particular to a method and system to prevent computer programs and data of any kind stored in a computer system from being manipulated and in particular for preventing hacker attacks and virus infection in computer systems, wherein said computer system comprises a storage means able to be read from and to be written to, and a means for switching said storage means into a write-protected mode. In order to provide improved prevention, the following steps are proposed, either during boot or during an installation process of an application program:comprising the steps of: a) prompting a user to perform a switching allowing temporarily writing to a write-protectable storage area (32), wherein a respective physical write-protection mechanism (34, 36) comprises a switching means (36) which is exclusively operable from outside of the operating system of said computer system, b) storing (520, 620) security-relevant information into said write-protectable storage area (32), c) prompting a user to perform a manual switching to restrict writing to said write-protectable storage area (32), thus resulting in generating a write-protected storage area (32), d) restricting any write access to said write protected storage area (32) in response to said manual switching during further runtime of said computer system.
摘要:
Management of energy consumption within a computing environment. Energy consumption of different hardware components are measured in the computing environment. Measurement includes voltage and current versus time used by the hardware components. The different measured values of energy consumption are collected, followed by tracking the hardware component used in time during an execution of an individual execution context within the computing environment. The energy consumption of the individual execution context is calculated by associating the corresponding collected measured energy consumption to the hardware component used.
摘要:
A mechanism is provided for verifying design modifications to a simulation design unit included within a simulation model of an integrated electronic device. A modified description is received of a simulation design unit that failed to meet an expected physical property value during an initial simulation of the entire integrated electronic device. A simulation of the simulation design unit is executed using a list of identified input signals from a trace file. The trace file is generated during the initial simulation and indicates state values for the list of identified input signals. A determination is made as to whether the simulation of the simulation design unit fails to meet the expected physical property value. An indication is generated that modifications made to an initial description of the simulation design unit are successful in response to the simulation of the simulation design unit meeting the expected physical property value.
摘要:
A system and associated method for mutually exclusively executing a critical section by a process in a computer system. The critical section accessing a shared resource is controlled by a lock. The method measures a detection time when a lock contention is detected, a wait time representing a duration of wait for the lock at each failed attempt to acquire the lock, and a delay representing a total lapse of time from the detection time till the lock is acquired. The delay is logged and used to calculate an average delay, which is compared with a suspension overhead time of the computer system on which the method is executed to determine whether to spin or to suspend the process while waiting for the lock to be released.
摘要:
A method of generating an executable that operates as a compiler includes: receiving a unified input description containing syntax rules for both regular and context-free expressions and interspersed code; generating a common internal representation from the unified input description; checking regular expressions in the common internal representation; checking context-free expressions in the common representation; checking the interspersed code; and outputting the executable.
摘要:
The present invention provides a system and method for detecting problems caused by access to incompletely initialized data storage in assembler and high-level language programs. An internal representation of the control flow of the source code of the assembler program is generated and a data-flow analysis method is applied to the internal representation.
摘要:
A system and associated method for mutually exclusively executing a critical section by a process in a computer system. The critical section accessing a shared resource is controlled by a lock. The method measures a detection time when a lock contention is detected, a wait time representing a duration of wait for the lock at each failed attempt to acquire the lock, and a delay representing a total lapse of time from the detection time till the lock is acquired. The delay is logged and used to calculate an average delay, which is compared with a suspension overhead time of the computer system to determine whether to spin or to suspend the process while waiting for the lock to be released. The number of processes waiting for the lock and the number of processes suspended are respectively counted to optimize the method.
摘要:
The present invention provides a system and method for detecting problems caused by access to incompletely initialized data storage in assembler programs comprising:a) Generating an internal representation of control flow of the source code of the assembler program by using standard techniques of compiler constructions, wherein said internal representation contains nodes for every statement found in said source code and a directed edge for every possible flow of control between said nodes,b) Attributing data attributes to said nodes and/or said edges, wherein said data attributes are used to store the information how many bits within the data storage can be guaranteed to be initialized,c) applying a data-flow analysis method to said internal representation of the control flow of the source code for determining how many bits of the data storage can be guaranteed to be initialized.
摘要:
A method of generating an executable that operates as a compiler includes: receiving a unified input description containing syntax rules for both regular and context-free expressions and interspersed code; generating a common internal representation from the unified input description; checking regular expressions in the common internal representation; checking context-free expressions in the common representation; checking the interspersed code; and outputting the executable.