G06F8/52

Apparatuses, Methods, Computer Programs, and Data Carriers for Indicating and Detecting Atomic Operations
20230185547 · 2023-06-15 ·

An apparatus comprising at least one interface configured to read one or more high-level code instructions; and at least one processor configured to read the one or more high-level code instructions using the interface, determine atomic operations in the high-level code instructions, and translate the one or more high-level code instructions into assembly code instructions, wherein atomic operations are indicated in the assembly code instructions based on the atomic operations in the high-level code instruction.

Controlling rendering operations by shader buffer identification

Methods of rendering a scene in a graphics system identify a draw call within a current render and analyse the last shader in the series of shaders used by the draw call to identify any buffers that are sampled by the last shader and that are to be written by a previous render that has not yet been sent for execution on the GPU. If any such buffers are identified, further analysis is performed to determine whether the last shader samples from the identified buffers using screen space coordinates that correspond to a current fragment location and if this determination is positive, the draw call is added to data relating to the previous render and the last shader is recompiled to replace an instruction that reads data from an identified buffer with an instruction that reads data from an on-chip register.

SYSTEM AND METHOD FOR DATA COMPATIBILITY ACROSS HETEROGENEOUS MACHINE ARCHITECTURES

A method includes loading a data element from at least one memory into at least one internal register. The method also includes converting the data element from a network standardized format to a device native format. The method further includes performing an operation on the data value. The method also includes de-converting the data element from the device native format to the network standardized format. In addition, the method includes storing the data element in the at least one memory.

Standardized model packaging and deployment

Standardized model packaging and deployment, including: generating a model package comprising: model definition data for a model; function code facilitating execution of the model; and at least one interface for at least one operating system.

Standardized model packaging and deployment

Standardized model packaging and deployment, including: generating a model package comprising: model definition data for a model; function code facilitating execution of the model; and at least one interface for at least one operating system.

Systems and methods for data flow integrity according to a controlled environment

Disclosed herein are embodiments of systems, methods, and products comprise a processor, which provides runtime enforcement of data flow integrity. The processor accesses the application binary file from the disk to execute an application and translates the application binary into intermediate representation. The processor applies the logic of data flow integrity controls to the intermediate representation. Specifically, the processor identifies the vulnerable code in the intermediate representation. The processor applies data flow integrity controls to the vulnerable code. The processor adds simple instrumentation that only changes the application's behavior when unauthorized data tampering occurs while preserving the application's normal behavior. When certain operations may cause unauthorized data tampering, the processor takes proper measures to stop the operations. The processor translates the intermediate representation back to a machine code and replaces the original binary with the machine code.

Systems and methods for data flow integrity according to a controlled environment

Disclosed herein are embodiments of systems, methods, and products comprise a processor, which provides runtime enforcement of data flow integrity. The processor accesses the application binary file from the disk to execute an application and translates the application binary into intermediate representation. The processor applies the logic of data flow integrity controls to the intermediate representation. Specifically, the processor identifies the vulnerable code in the intermediate representation. The processor applies data flow integrity controls to the vulnerable code. The processor adds simple instrumentation that only changes the application's behavior when unauthorized data tampering occurs while preserving the application's normal behavior. When certain operations may cause unauthorized data tampering, the processor takes proper measures to stop the operations. The processor translates the intermediate representation back to a machine code and replaces the original binary with the machine code.

Application binary rewriting to reduce binary attack surface area

Unused instructions and no longer used instructions in a target application binary are determined. The target application binary is rewritten before and after runtime execution of the target application binary to remove the unused and no longer used instructions to reduce binary attack surface area for the runtime execution of the target application binary. Methods, computer systems, and computer program products are disclosed.

Application binary rewriting to reduce binary attack surface area

Unused instructions and no longer used instructions in a target application binary are determined. The target application binary is rewritten before and after runtime execution of the target application binary to remove the unused and no longer used instructions to reduce binary attack surface area for the runtime execution of the target application binary. Methods, computer systems, and computer program products are disclosed.

SYSTEMS AND METHODS FOR PROVIDING A HYBRID MOBILE APPLICATION

Disclosed are systems and methods for providing a hybrid mobile application. The method may include: receiving specification of at least one feature of a mobile application. The mobile application may be specific to a first programming platform. The method may further include generating the at least one feature based on the specification. The at least one feature may be written in a programming language specific to a second programming platform, and the second programming platform may be different from the first programming platform. The method may also include compiling a programming wrapper based on the at least one feature of the mobile application, combining the at least one feature and the programming wrapper into a programming component, packaging the programming component into the mobile application, and distributing the mobile application in a repository of the first programming platform.