Skip to main content

Showing 1–4 of 4 results for author: Maïza, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:1811.01670  [pdf, other

    cs.PL cs.CC

    Fast and exact analysis for LRU caches

    Authors: Claire Maïza, Valentin Touzeau, David Monniaux, Jan Reineke

    Abstract: For applications in worst-case execution time analysis and in security, it is desirable to statically classify memory accesses into those that result in cache hits, and those that result in cache misses. Among cache replacement policies, the least recently used (LRU) policy has been studied the most and is considered to be the most predictable. The state-of-the-art in LRU cache analysis presents a… ▽ More

    Submitted 20 December, 2018; v1 submitted 5 November, 2018; originally announced November 2018.

  2. Ascertaining Uncertainty for Efficient Exact Cache Analysis

    Authors: Valentin Touzeau, Claire Maïza, David Monniaux, Jan Reineke

    Abstract: Static cache analysis characterizes a program's cache behavior by determining in a sound but approximate manner which memory accesses result in cache hits and which result in cache misses. Such information is valuable in optimizing compilers, worst-case execution time analysis, and side-channel attack quantification and mitigation.Cache analysis is usually performed as a combination of `must' and… ▽ More

    Submitted 20 December, 2018; v1 submitted 28 September, 2017; originally announced September 2017.

    Journal ref: Rupak Majumdar; Viktor Kuncak. Computer Aided Verification - 29th International Conference, Jul 2017, Heidelberg, France. Springer, 10427 (2), pp.20 - 40, 2017, Lecture notes in computer science. http://cavconference.org/2017/

  3. arXiv:1701.08030  [pdf, ps, other

    cs.PL cs.LO

    Model Checking of Cache for WCET Analysis Refinement

    Authors: Valentin Touzeau, Claire Maïza, David Monniaux

    Abstract: On real-time systems running under timing constraints, scheduling can be performed when one is aware of the worst case execution time (WCET) of tasks. Usually, the WCET of a task is unknown and schedulers make use of safe over-approximations given by static WCET analysis. To reduce the over-approximation, WCET analysis has to gain information about the underlying hardware behavior, such as pipelin… ▽ More

    Submitted 6 July, 2017; v1 submitted 27 January, 2017; originally announced January 2017.

  4. arXiv:1405.7962  [pdf, ps, other

    cs.PL cs.LO

    How to Compute Worst-Case Execution Time by Optimization Modulo Theory and a Clever Encoding of Program Semantics

    Authors: Julien Henry, Mihail Asavoae, David Monniaux, Claire Maïza

    Abstract: In systems with hard real-time constraints, it is necessary to compute upper bounds on the worst-case execution time (WCET) of programs; the closer the bound to the real WCET, the better. This is especially the case of synchronous reactive control loops with a fixed clock; the WCET of the loop body must not exceed the clock period. We compute the WCET (or at least a close upper bound thereof) as t… ▽ More

    Submitted 30 May, 2014; originally announced May 2014.

    Comments: ACM SIGPLAN/SIGBED Conference on Languages, Compilers and Tools for Embedded Systems 2014, Edimbourg : United Kingdom (2014)