نتایج جستجو برای: return oriented programming

تعداد نتایج: 509816  

2011
Kangjie Lu Dabi Zou Weiping Wen Debin Gao

Return-oriented programming (ROP) is an attack that has been shown to be able to circumvent W ⊕X protection. However, it was not clear if ROP can be made as powerful as non-ROP malicious code in other aspects, e.g., be packed to make static analysis difficult, be printable to evade non-ASCII filtering, be polymorphic to evade signaturebased detection, etc. Research in these potential advances i...

Journal: :Security and Communication Networks 2016
Yefeng Ruan Sivapriya Kalyanasundaram Xukai Zou

A prominent software security violation-buffer overflow attack has taken various forms and poses serious threats until today. One such vulnerability is return-oriented programming attack. An return-oriented programming attack circumvents the dynamic execution prevention, which is employed in modern operating systems to prevent execution of data segments, and attempts to execute unintended instr...

2006
R. Rak S. Drożdż J. Kwapień P. Oświȩcimka

Using the correlation matrix formalism we study the temporal aspects of the Warsaw Stock Market evolution as represented by the WIG20 index. The high frequency (1 min) WIG20 recordings over the time period between January 2001 and October 2005 are used. The entries of the correlation matrix considered here connect different distinct periods of the stock market dynamics, like days or weeks. Such...

Journal: :IJISSCM 2011
Albert Wee Kwan Tan Arun Kumar Balan Sundarakani

As reverse logistics is a relatively new field in supply chain management, especially in Asia, a detailed study is conducted to understand the status of companies practicing reverse logistics to support their Asia Pacific operations. This paper discusses an empirical examination of a company performing reverse logistics in Asia with Singapore being the coordination hub with the United States (U...

2012
Vishwath Mohan Kevin W. Hamlen

This paper proposes a new self-camouflaging malware propagation system, Frankenstein, that overcomes shortcomings in the current generation of metamorphic malware. Specifically, although mutants produced by current state-of-theart metamorphic engines are diverse, they still contain many characteristic binary features that reliably distinguish them from benign software. Frankenstein forgoes the ...

2003
Alberto Palloni Elizabeth Arias

We test three competing explanations of the adult “Hispanic mortality paradox:” data artifact, migration, and cultural or social buffering effects. Based on a series of parametric hazard models estimated on 9 years of mortality follow-up data, our results suggest that the “Hispanic” mortality advantage is a feature found only among foreign-born Mexicans and foreign-born Hispanics other than Cub...

2013
Sara Aibar Celia Fontanillo Conrad Droste Javier De Las Rivas

3 Main function of the package: geNetClassifier() 5 3.1 Loading the package and data . . . . . . . . . . . . . . . . . . . . . . . . 6 3.2 Run geNetClassifier() . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.3 Overview of the data returned by geNetClassifier() . . . . . . . . . . . . 9 3.4 Return I: Genes ranking . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.4.1 Signif...

2014
Nicholas Carlini David A. Wagner

Return Oriented Programming (ROP) has become the exploitation technique of choice for modern memory-safety vulnerability attacks. Recently, there have been multiple attempts at defenses to prevent ROP attacks. In this paper, we introduce three new attack methods that break many existing ROP defenses. Then we show how to break kBouncer and ROPecker, two recent low-overhead defenses that can be a...

2015
Jason Wei Jinguo Zheng

We empirically examine the impact of trading activities on the liquidity of individual equity options measured by the proportional bid–ask spread. There are three main findings. First, the option return volatility, defined as the option price elasticity times the stock return volatility, has a much higher power in explaining the spread variations than the commonly considered liquidity determina...

Journal: :Management Science 2016
Umit G. Gurun Rick Johnston Stanimir Markov

We explore sell-side debt analysts’ contributions to the efficiency of securities markets. We document that debt returns lag equity returns less when debt research coverage exists, consistent with debt analysts facilitating the process by which available information is impounded in debt prices. The effect is incremental to, but comparable in magnitude to, hedge fund ownership’s effect. No such ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید