نتایج جستجو برای: return oriented programming

تعداد نتایج: 509816  

Journal: :Science of Computer Programming 2016

Journal: :ACTA Universitatis Cibiniensis 2016

Journal: :iranian journal of optimization 0
a. ebrahimnejad islamic azad university, qaemshahr branch, department of mathematics, qaemshahr, iran

recently, lotfi et al. [10] established an equivalence model between the output-oriented dual ccr model and multiple objective linear programming (molp) and used an interactive method for finding target unit on efficiency frontier such that the decision maker preferences can be taken into account. however their method is not applicable for situations in which some outputs are undesirable and ne...

1999
Ying-Hong Wang Chi-Ming Chung Timothy K. Shih Huan-Chao Keh

software metrics is a necessaly step for sofhvare reliability and quality and so f ia re metrics technique of trtrditional procedure-oriented programming is fairly maturity and has various methodologies and tools available for use. Recently. object-oriented programming became popular. However, traditional procedure-oriented software metrics are not appropriate for the development of an object-o...

2015
Lucas Davi Christopher Liebchen Ahmad-Reza Sadeghi Kevin Z. Snow Fabian Monrose

Until recently, it was widely believed that code randomization (such as fine-grained ASLR) can effectively mitigate code reuse attacks. However, a recent attack strategy, dubbed just-in-time return oriented programming (JIT-ROP), circumvents code randomization by disclosing the (randomized) content of many memory pages at runtime. In order to remedy this situation, new and improved code randomi...

2003
C. Vecchiola A. Gozzi M. Coccoli A. Boccalatte

In the last decades, a significant growth of agent oriented systems has been observed, which has stimulated a more precise formalism for the definition of both agent and multi-agent systems, as well as the release of a huge number of agent development environment. In this work a new programming paradigm is proposed, that is agent oriented programming instead of object oriented programming. The ...

2016
Julian Lettner Benjamin Kollenda Andrei Homescu Per Larsen Felix Schuster Lucas Davi Ahmad-Reza Sadeghi Thorsten Holz Michael Franz

The lower layers in the modern computing infrastructure are written in languages threatened by exploitation of memory management errors. Recently deployed exploit mitigations such as control-flow integrity (CFI) can prevent traditional return-oriented programming (ROP) exploits but are much less effective against newer techniques such as Counterfeit Object-Oriented Programming (COOP) that execu...

2017
Tim Blazytko Moritz Contag Cornelius Aschermann Thorsten Holz

Current state-of-the-art deobfuscation approaches operate on instruction traces and use a mixed approach of symbolic execution and taint analysis; two techniques that require precise analysis of the underlying code. However, recent research has shown that both techniques can easily be thwarted by specific transformations. As program synthesis can synthesize code of arbitrary code complexity, it...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید