Code Abuse

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

crime of child abuse from the viewpoint of the islamic penal code and twelver shiite jurisprudence

when a crime occurs in society, albeit small, first it endangers the society and creates chaos in the society; in the second place, it make people feel pity for who was assaulted. if the victims are children of the community, we expect it to take action very quickly. this research is not about juvenile delinquency and not to criminalize children but to scrutinize how the crimes are performed ag...

متن کامل

A Code-Based Approach to Unauthorized Access Under the Computer Fraud Abuse Act

Thirty years ago, Congress passed the Computer Fraud and Abuse Act ("CFAA ") to combat the emerging problem of computer crime. The statute's core prohibitions targeted one who "accesses" a computer "without authorization" or who "exceeds authorized access." Over time, the incremental statutory changes and large-scale technological changes have dramatically expanded the potential scope of the CF...

متن کامل

Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate

Recent measurements of the Windows code-signing certificate ecosystem have highlighted various forms of abuse that allow malware authors to produce malicious code carrying valid digital signatures. However, the underground trade that allows miscreants to acquire such certificates is not well understood. In this paper, we illuminate two aspects of this trade. First, we investigate 4 leading vend...

متن کامل

Alcohol Abuse and Oral Cancer

Background: Various medical, psychiatric and social problems affecting alcohol abuser tend to overshadow their oral health. From an epidemiologic viewpoint, chronic consumption of alcoholic beverages is associated with an increased risk for the upper gastrointestinal tract cancer, and tobacco and alcohol are regarded as the major risk factors for oral cancer. The objective of this presentation ...

متن کامل

Code Obfuscation using Code Splitting with Self-modifying Code

Code Obfuscation is a protection technique that transforms the software into a semantically equivalent one which is strenuous to reverse engineer. As a part of software protection and security, code obfuscation got commercial interest from both vendors’ side to keep their proprietary as secret and customers’ side to have a trusted software that don’t leek or destroy their personal information. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Queue

سال: 2012

ISSN: 1542-7730,1542-7749

DOI: 10.1145/2405116.2407417