Indistinguishable Executable Code Generation Method

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatic Generation of Executable Code from Software Architecture Models

Our effort is focused on bridging the gap between software design and implementation of component-based systems using software architectures at the modeling/design level and the coordination paradigm at the implementation level. We base our work on the clear support of both software architectures and event-driven coordination models for Component Based Software Engineering and the similarities ...

متن کامل

Machine Code Optimization - Improving Executable Object Code

The topic of compiler optimization covers a wide range of program analysis methods and program transformations which are applied primarily to improve the speed or space efficiency of a target program. These techniques are typically applied to a representation of the target program which is, to some degree, removed from the program representation executed by the hardware. The representations on ...

متن کامل

Methods of executable code protection

The article deals with the problems in constructing a protection system of executable code. The techniques of breaking the integrity of executable code and ways to eliminate them are described. The adoption of virtual machine technology in the context of executable code protection from analysis is considered. The substantiation of the application of virtual machines as the best way to oppose th...

متن کامل

Compressing Differences of Executable Code

Programs change often, and it is important to bring those changes to users as conveniently as possible. The two most common ways to deliver changes are to send a whole new program or to send “patches” that encode the differences between the two versions, requiring much less space. In this paper, we address computation of patches for executables of programs. Our techniques take into account the ...

متن کامل

Naive Differences of Executable Code

The increasing frequency with which serious security flaws are discovered and the increasing rapidity with which they are exploited have made it necessary for programs to be updated far more frequently than in the past. While binary updates are generally far more convenient than source code updates, the distribution of pointers throughout executable files makes it much harder to produce compact...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2016

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2016.10.8.27