Jack W. Davidson

Affiliations:
  • University of Virginia, Charlottesville, USA


According to our database1, Jack W. Davidson authored at least 131 papers between 1980 and 2023.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2008, "For contributions in compiler design and implementation.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Zipr: A High-Impact, Robust, Open-source, Multi-platform, Static Binary Rewriter.
CoRR, 2023

Helix++: A platform for efficiently securing software.
CoRR, 2023

2022
CELEST: Federated Learning for Globally Coordinated Threat Detection.
CoRR, 2022

High-performance reliable network-multicast over a trial deployment.
Clust. Comput., 2022

Sentinel: A Multi-institution Enterprise Scale Platform for Data-driven Cybersecurity Research.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

2021
Collaborative Information Sharing for ML-Based Threat Detection.
CoRR, 2021

On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware.
CoRR, 2021

ACM publications finances for 2020.
Commun. ACM, 2021

Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

BigMap: Future-proofing Fuzzers with Efficient Large Maps.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
ACM publications finances.
Commun. ACM, 2020

A Trial Deployment of a Reliable Network-Multicast Application across Internet2.
Proceedings of the IEEE/ACM Innovating the Network for Data-Intensive Science, 2020

2019
Defeating denial-of-service attacks in a self-managing <i>N</i>-variant system.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

MalMax: Multi-Aspect Execution for Automated Dynamic Web Server Malware Analysis.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Cubismo: decloaking server-side malware via cubist program analysis.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge.
IEEE Secur. Priv., 2018

Toward sustainable access: where are we now?
Commun. ACM, 2018

2017
Securing Binary Code.
IEEE Secur. Priv., 2017

Zipr: Efficient Static Binary Rewriting for Security.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Zipr++: Exceptional Binary Rewriting.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Mixr: Flexible Runtime Rerandomization for Binaries.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Online control adaptation for safe and secure autonomous vehicle operations.
Proceedings of the 2017 NASA/ESA Conference on Adaptive Hardware and Systems, 2017

2016
Diversity in Cybersecurity.
Computer, 2016

A Proof Infrastructure for Binary Programs.
Proceedings of the NASA Formal Methods - 8th International Symposium, 2016

Predicting the memory bandwidth and optimal core allocations for multi-threaded applications on large-scale NUMA machines.
Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, 2016

A System for the Security Protection of Embedded Binary Programs.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Dynamic Canary Randomization for Improved Software Security.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Should conferences meet journals and where?: a proposal for 'PACM'.
Commun. ACM, 2015

Charting the future: scholarly publishing in CS.
Commun. ACM, 2015

Matryoshka: Strengthening Software Protection via Nested Virtual Machines.
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015

Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Practices of PLDI.
ACM SIGPLAN Notices, 2014

What's the PointiSA?
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

DraMon: Predicting memory bandwidth usage of multi-threaded programs with high accuracy and low overhead.
Proceedings of the 20th IEEE International Symposium on High Performance Computer Architecture, 2014

To B or not to B: Blessing OS Commands with Software DNA Shotgun Sequencing.
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

A Framework for Creating Binary Rewriting Tools (Short Paper).
Proceedings of the 2014 Tenth European Dependable Computing Conference, 2014

2013
Moving Target Defenses in the Helix Self-Regenerative Architecture.
Proceedings of the Moving Target Defense II, 2013

ReSense: Mapping dynamic workloads of colocated multithreaded applications using resource sensitivity.
ACM Trans. Archit. Code Optim., 2013

Positioning ACM for an open access future.
Commun. ACM, 2013

Software protection for dynamically-generated code.
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, 2013

2012
Enabling dynamic binary translation in embedded systems with scratchpad memory.
ACM Trans. Embed. Comput. Syst., 2012

REEact: a customizable virtual execution manager for multicore platforms.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

Replacement attacks against VM-protected applications.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

ILR: Where'd My Gadgets Go?
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation.
Proceedings of the Runtime Verification, Third International Conference, 2012

Performance analysis of thread mappings with a holistic view of the hardware resources.
Proceedings of the 2012 IEEE International Symposium on Performance Analysis of Systems & Software, 2012

2011
Evaluating indirect branch handling mechanisms in software dynamic translation systems.
ACM Trans. Archit. Code Optim., 2011

Toward Digital Asset Protection.
IEEE Intell. Syst., 2011

ACM's copyright policy.
Commun. ACM, 2011

Characterizing multi-threaded applications based on shared-resource contention.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2011

PEASOUP: preventing exploits against software of uncertain provenance (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

Component-Oriented Monitoring of Binaries for Security.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
A Secure and Robust Approach to Software Tamper Resistance.
Proceedings of the Information Hiding - 12th International Conference, 2010

On the effectiveness of the metamorphic shield.
Proceedings of the Software Architecture, 4th European Conference, 2010

2009
Practical exhaustive optimization phase order exploration and evaluation.
ACM Trans. Archit. Code Optim., 2009

Security through Diversity: Leveraging Virtual Machine Technology.
IEEE Secur. Priv., 2009

Addressing the challenges of DBT for the ARM architecture.
Proceedings of the 2009 ACM SIGPLAN/SIGBED conference on Languages, 2009

MEDS: The Memory Error Detection System.
Proceedings of the Engineering Secure Software and Systems, 2009

Using program metadata to support SDT in object-oriented applications.
Proceedings of the 4th workshop on the Implementation, 2009

2008
Defense against the dark arts.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

Security through redundant data diversity.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

08441 Abstracts Collection - Emerging Uses and Paradigms for Dynamic Binary Translation.
Proceedings of the Emerging Uses and Paradigms for Dynamic Binary Translation, 26.10., 2008

08441 Final Report - Emerging Uses and Paradigms for Dynamic Binary Translation.
Proceedings of the Emerging Uses and Paradigms for Dynamic Binary Translation, 26.10., 2008

Reducing pressure in bounded DBT code caches.
Proceedings of the 2008 International Conference on Compilers, 2008

2007
Fast, accurate design space exploration of embedded systems memory configurations.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Virtual Execution Environments: Support and Tools.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Fragment cache management for dynamic binary translators in embedded systems with scratchpad.
Proceedings of the 2007 International Conference on Compilers, 2007

2006
VISTA: VPO interactive system for tuning applications.
ACM Trans. Embed. Comput. Syst., 2006

Secure and practical defense against code-injection attacks using software dynamic translation.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

Evaluating fragment construction policies for SDT systems.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

In search of near-optimal optimization phase orderings.
Proceedings of the 2006 ACM SIGPLAN/SIGBED Conference on Languages, 2006

Techniques and tools for dynamic optimization.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

On the Use of Compilers in DSP Laboratory Instruction.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Exhaustive Optimization Phase Order Space Exploration.
Proceedings of the Fourth IEEE/ACM International Symposium on Code Generation and Optimization (CGO 2006), 2006

Java 5.0 Program Design - Java 5.0 Update Edition.
McGraw-Hill, ISBN: 978-0-07-325030-4, 2006

2005
Fast and efficient searches for effective optimization-phase sequences.
ACM Trans. Archit. Code Optim., 2005

An infrastructure for designing custom embedded wide counterflow pipelines.
Microprocess. Microsystems, 2005

Compile-Time Planning for Overhead Reduction in Software Dynamic Translators.
Int. J. Parallel Program., 2005

Using de-optimization to re-optimize code.
Proceedings of the EMSOFT 2005, 2005

2004
Custom Wide Counterflow Pipelines for High-Performance Embedded Applications.
IEEE Trans. Computers, 2004

Fast searches for effective optimization phase sequences.
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, 2004

EMBARC: an efficient memory bank assignment algorithm for retargetable compilers.
Proceedings of the 2004 ACM SIGPLAN/SIGBED Conference on Languages, 2004

Overhead Reduction Techniques for Software Dynamic Translation.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

2003
Automatic Detection and Diagnosis of Faults in Generated Code for Procedure Calls.
IEEE Trans. Software Eng., 2003

Code Generation for a Dual Instruction Set Processor Based on Selective Code Transformation.
Proceedings of the Software and Compilers for Embedded Systems, 7th International Workshop, 2003

Finding effective optimization phase sequences.
Proceedings of the 2003 Conference on Languages, 2003

Continuous Compilation: A New Approach to Aggressive and Adaptive Code Transformation.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Retargetable and Reconfigurable Software Dynamic Translation.
Proceedings of the 1st IEEE / ACM International Symposium on Code Generation and Optimization (CGO 2003), 2003

2002
VISTA: a system for interactive code improvement.
Proceedings of the 2002 Joint Conference on Languages, 2002

<i>Quick piping: </i> a fast, high-level model for describing processor pipelines.
Proceedings of the 2002 Joint Conference on Languages, 2002

Safe Virtual Execution Using Software Dynamic Translation.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
SIGPLAN Web Pages and Mailing List.
ACM SIGPLAN Notices, 2001

Automatic memory hierarchy characterization.
Proceedings of the 2001 IEEE International Symposium on Performance Analysis of Systems and Software, 2001

Protection of Software-Based Survivability Mechanisms.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
An Infrastructure for Designing Custom Embedded Counter-flow Pipelines.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

Exploring the Limits of Sub-Word Level Parallelism.
Proceedings of the 2000 International Conference on Parallel Architectures and Compilation Techniques (PACT'00), 2000

1999
Architectural Considerations for Application-Specific Counterflow Pipelines.
Proceedings of the 18th Conference on Advanced Research in VLSI (ARVLSI '99), 1999

1998
The Design of EzWindows: A Graphics API for an Introductory Programming Course
CoRR, 1998

Machine Descriptions to Build Tools for Embedded Systems.
Proceedings of the Languages, 1998

A Design Environment for Counterflow Pipeline Synthesis.
Proceedings of the Languages, 1998

1996
Target-Sensitive Construction of Diagnostic Programs for Procedure Calling Sequence Generators.
Proceedings of the ACM SIGPLAN'96 Conference on Programming Language Design and Implementation (PLDI), 1996

Aggressive Loop Unrolling in a Retargetable Optimizing Compiler.
Proceedings of the Compiler Construction, 6th International Conference, 1996

1995
A Formal Model of Procedure Calling Conventions.
Proceedings of the Conference Record of POPL'95: 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995

Improving instruction-level parallelism by loop unrolling and dynamic memory disambiguation.
Proceedings of the 28th Annual International Symposium on Microarchitecture, Ann Arbor, Michigan, USA, November 29, 1995

1994
The Advantages of Machine-Dependent Global Optimization.
Proceedings of the Programming Languages and System Architectures, 1994

Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses.
Proceedings of the ACM SIGPLAN'94 Conference on Programming Language Design and Implementation (PLDI), 1994

1992
Subprogram Inlining: A Study of its Effects on Program Execution Time.
IEEE Trans. Software Eng., 1992

Relating Static and Dynamic Machine Code Measurements.
IEEE Trans. Computers, 1992

1991
Methods for Saving and Restoring Register Values across Function Calls.
Softw. Pract. Exp., 1991

A design environment for addressing architecture and compiler interactions.
Microprocess. Microsystems, 1991

Code Generation for Streaming: An Access/Execute Mechanism.
Proceedings of the ASPLOS-IV Proceedings, 1991

1990
Ease: An Environment for Architecture Study and Experimentation.
Proceedings of the 1990 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1990

Profile guided code positioning (with retrospective)
Proceedings of the 20 Years of the ACM SIGPLAN Conference on Programming Language Design and Implementation 1979-1999, 1990

Reducing the Cost of Branches by Using Registers.
Proceedings of the 17th Annual International Symposium on Computer Architecture, 1990

1989
Quick Compilers Using Peephole Optimization.
Softw. Pract. Exp., 1989

1988
A Study of a C Function Inliner.
Softw. Pract. Exp., 1988

A Portable Global Optimizer and Linker.
Proceedings of the ACM SIGPLAN'88 Conference on Programming Language Design and Implementation (PLDI), 1988

1987
Automatic Inference and Fast Interpretation of Peephole Optimization Rules.
Softw. Pract. Exp., 1987

Cint: a RISC interpreter for the C programming language.
Proceedings of the Symposium on Interpreters and Interpretive Techniques, 1987, St. Paul, Minnesota, USA, June 24, 1987

The Effect of Instruction Set Complexity on Program Size and Memory Performance.
Proceedings of the Second International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS II), 1987

1986
A retargetable instruction reorganizer.
Proceedings of the 1986 SIGPLAN Symposium on Compiler Construction, 1986

1984
Code Selection through Object Code Optimization.
ACM Trans. Program. Lang. Syst., 1984

Register Allocation and Exhaustive Peephole Optimization.
Softw. Pract. Exp., 1984

Automatic generation of peephole optimizations.
Proceedings of the 1984 SIGPLAN Symposium on Compiler Construction, 1984

Automatic generation of peephole optimizations (with retrospective)
Proceedings of the 20 Years of the ACM SIGPLAN Conference on Programming Language Design and Implementation 1979-1999, 1984

1982
Eliminating Redundant Object Code.
Proceedings of the Conference Record of the Ninth Annual ACM Symposium on Principles of Programming Languages, 1982

1980
The Design and Application of a Retargetable Peephole Optimizer.
ACM Trans. Program. Lang. Syst., 1980


  Loading...