Feedback-driven binary code diversification
نویسندگان
چکیده
منابع مشابه
Diversification-driven tabu search for unconstrained binary quadratic problems
This paper describes a Diversification-Driven Tabu Search (D2TS) algorithm for solving unconstrained binary quadratic problems. D2TS is distinguished by the introduction of a perturbation-based diversification strategy guided by longterm memory. The performance of the proposed algorithm is assessed on the largest instances from theORLIB library (up to 2500 variables) as well as still larger ins...
متن کاملSphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the binary code and architecture states to attackers. This approach dramatically reduces an attacker’s ability to exploit information gained from on...
متن کاملNon binary huffman code pdf
A Method for the Construction of Minimum-Redundancy Codes PDF.HUFFMAN CODES. Corollary 28 Consider a coding from a length n vector of source symbols, x x1x2.xn, to a binary codeword of length lx. Then the.Correctness of the Huffman coding nitro pdf reader 32 bit 1 1 1 13 create pdf files algorithm. A binary code encodes each character as a binary. Code that encodes the file using as few bits as...
متن کاملBinary code-based Human Detection
HOG features are effective for object detection, but their focus on local regions makes them highdimensional features. To reduce the memory required for the HOG features, this paper proposes a new feature, R-HOG, which creates binary codes from the HOG features extracted from two local regions. This approach enables the created binary codes to reflect the relationships between local regions. Co...
متن کاملTransparent Parallelization of Binary Code
This paper describes a system that applies automatic parallelization techniques to binary code. The system works by raising raw executable code to an intermediate representation that exhibits all memory accesses and relevant register definitions, but outlines detailed computations that are not relevant for parallelization. It then uses an off-the-shelf polyhedral parallelizer, first applying ap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Architecture and Code Optimization
سال: 2013
ISSN: 1544-3566,1544-3973
DOI: 10.1145/2400682.2400683