نتایج جستجو برای: code reuse attacks

تعداد نتایج: 245922  

2015
Dimpal Shah Heena Jethani Hardik Joshi

In today's digital era information access is just a click away. so computer science students also have easy access to all the source codes from different websites thus it has become difficult for academicians to detect source code reuse in students programming assignments. The new trend in the area of source code reuse is using the source code by translating it in another programming language p...

2012

Software reuse has received much attention since the concept was introduced in 1968. Software reuse itself is a broad concept that has many levels of meaning, ranging from strict code reuse, to design/analysis reuse, to entire application reuse. Reusable software components are designed to apply the power and benefit of reusable, interchangeable parts from other industries to the field of softw...

This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...

Journal: :Journal of Systems and Software 2001
William B. Frakes Giancarlo Succi

The relationship between amount of reuse, quality, and productivity was studied using four sets of C and C++ modules collected from industrial organizations. The data domains are: text retrieval, user interface, distributed repository, and medical records. Reuse in this paper is ad-hoc, black box, compositional, code reuse. The data generally show that more reuse results in higher quality, but ...

2016
Themistoklis Diamantopoulos Antonis Noutsos Andreas Symeonidis

In order to maintain, extend or reuse software projects one has to primarily understand what a system does and how well it does it. And, while in some cases information on system functionality exists, information covering the non-functional aspects is usually unavailable. Thus, one has to infer such knowledge by extracting design patterns directly from the source code. Several tools have been d...

2013
Kanwaljeet Kaur Vivek Thapar

Reusability is the likelihood a segment of source code that can be used again to add new functionalities with slight or no modification. Reusable modules and classes reduce implementation time, increase the likelihood that prior testing and use has eliminated bugs and localizes code modifications when a change in implementation is required. Software reuse is the process of implementing or updat...

2016
Matthias Neugschwandtner Collin Mulliner William K. Robertson Engin Kirda

Entering the age of the Internet of things, embedded devices are everywhere. They are built using common hardware such as RISC-based ARM and MIPS platforms, and lightweight open software components. Because of their limited resources, such systems often lack the protection mechanisms that have been introduced to the desktop and server world. In this paper, we present BINtegrity, a novel approac...

Journal: :IJCNS 2009
Yu Zhang Xingshe Zhou Yi Ming Ji Yee Wei Law Marimuthu Palaniswami

Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behav...

2011
Pieter Philippaerts Yves Younan Stijn Muylle Frank Piessens Sven Lachmund Thomas Walter

In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application’s co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید