8 Questions 7 Answers 0 Followers
Questions related from Hussien Al-haj Ahmad
Is it necessary to implement the other methods to compare with the proposed method, or is it acceptable to rely on the results presented in those methods, especially when it's not feasible to...
22 November 2023 5,540 0 View
I have developed a new technique. Although I have performed multiple experiments and obtained various "meaningful" results, I am unsure about how to evaluate the technique's performance and ensure...
10 May 2023 9,638 6 View
Suppose we have two programs. The program A is in binary form (ELF file), and the second program is a shred object file, say SO. I want to hook some instruction in the program A and move execution...
12 January 2023 9,581 5 View
Assume we have a program with different instructions. Due to some limitations in the field, it is not possible to test all the instructions. Instead, assume we have tested 4 instructions and...
31 October 2022 3,670 3 View
How could we profile a c program in order to obtain detailed information related to its executed instructions (Dynamic Instructions)? I'm looking for a tool with which I can use it to obtain...
19 July 2021 1,524 6 View
In one of the articles, I read the following hypothesis: We assume that the processor’s control logic is protected against faults via control-flow checking. Regarding ARM processors, I wonder if...
02 May 2021 350 2 View
In order to improve dependability of a given processor, e.g., ARM processor, vulnerability analysis can be carried out at different levels, for example: architectural vulnerability analysis,...
14 May 2020 686 0 View
Sometimes in order to gain better performance in terms of execution time, inline assembly within source code is used. For example, it is possible to write assembly code inside C code to...
08 December 2019 1,396 6 View