نتایج جستجو برای: code reuse attack

تعداد نتایج: 269071  

Journal: :Journal of Software: Evolution and Process 2016
Ameer Armaly Collin McMillan

A key problem during copy-paste source code reuse is that, to reuse even a small section of code from a program as opposed to an API, a programmer must include a huge amount of additional source code from elsewhere in the same program. This additional code is notoriously large and complex, and portions can only be identified at runtime. In this paper, we propose execution record/replay as a sol...

1997
Elizabeth Burd Malcolm Munro

This paper describes an investigation into the use of code replication within legacy software systems. Two cases of replication are investigated. These are replication with an individual program and replication of an entire or part of a program across a program suite. For each of the cases an example is given from code used within the commercial sector. The instances of replication are then inv...

Journal: :IEICE Transactions on Information and Systems 2018

Journal: :DEStech Transactions on Computer Science and Engineering 2018

2003
Stefan Kettemann Dirk Muthig Michalis Anastasopoulos

Architecture (not component-oriented) Component Implementation (Source Code) Traditional Implementation Component oriented Implementation Im lem eation Component Architecture Component Implementation (Source Code) (-) Paradigm Gap (-) Poor Reuse (+) Component Paradigm (+) Reuse Representation L e v e l o f A b s t r a c t i o n

2016
Sri Hari Krishna Narayanan Paul Hovland

The efficient use of a system is of paramount importance in high-performance computing. Applications need to be engineered for future systems even before the architecture of such a system is clearly known. Static performance analysis that generates performance bounds is one way to approach the task of understanding application behavior. Performance bounds provide an upper limit on the performan...

Journal: :J. Inf. Sec. Appl. 2016
Andreas Follner Eric Bodden

Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years. Researchers have answered the threat with various mitigation techniques, but nevertheless, new exploits that successfully bypass these technologies still appear on a regular basis. In this paper, we propose ROPocop, a novel approach for dete...

1993
Sanjay Bhansali

In order to support the synthesis of large, complex software systems, we need to focus on issues pertaining to the architectural design of a system in addition to algorithm and data structure design. In this paper, we present an approach that is based on abstracting the architectural design of a set of problems in the form of a generic architecture , and providing tools that can be used to inst...

2017
Anna Zamansky Iris Reinhartz-Berger

Software reuse is the practice of using artifacts from existing systems to build new ones. It has been shown effective for improving quality and maintainability and for reducing cost and development time. Human factors have been identified as significant barriers to a wider adoption of reuse practices in industry. In this paper we consider a tool-supported approach for systematic reuse of objec...

Journal: :Journal of Logical and Algebraic Methods in Programming 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید