Abstract:
PROBLEM TO BE SOLVED: To provide a process, a system, and a computer program for determining whether a method of a computer program is a validator.SOLUTION: The computer program which has an illegal pattern and the method is received (102). The target method is normalized so that respective return statements related to the illegal pattern return a constant Boolean value (104). A first path condition and a second path condition for one or a plurality of corresponding paths are determined so that one or a plurality of corresponding basic blocks return a constant true Boolean value for the first path condition and a constant false Boolean value for the second path condition (106, 114). When unsatisfiability of both the path conditions is false, it is reported that the method is not a validator (110, 118). When the unsatisfiability of both the path conditions is true, it is reported that the method is a validator (112, 120).
Abstract:
Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions.
Abstract:
Techniques facilitating generation of a fused kernel that can approximate a full kernel of a convolutional neural network are provided. In one example, a computer-implemented method comprises determining a first pattern of samples of a first sample matrix and a second pattern of samples of a second sample matrix. The first sample matrix can be representative of a sparse kernel, and the second sample matrix can be representative of a complementary kernel. The first pattern and second pattern can be complementary to one another. The computer- implemented method also comprises generating a fused kernel based on a combination of features of the sparse kernel and features of the complementary kernel that are combined according to a fusing approach and training the fused kernel.
Abstract:
A mobile device includes a computer-readable medium storing computer program instructions, a data processor to execute the instructions, and communication circuitry configured for local area wireless connectivity with neighboring mobile devices and for wireless connectivity to a remote server from which at least a portion of a data set is downloaded. Execution of the computer program instructions results in estimating a cost to perform a computation task on the data set. If the estimated cost is greater than a threshold cost, an ad-hoc wireless network is formed with at least one other mobile device and the mobile device downloads a portion of the data set assigned to the mobile device. The mobile device then performs a computation task on the downloaded portion of the data set and wirelessly transfers a result of the computation task to the at least one other mobile device of the ad-hoc wireless network.