نتایج جستجو برای: code reuse attack

تعداد نتایج: 269071  

Journal: :Proceedings of the Institute for System Programming of the RAS 2018

Journal: :IEEE Transactions on Computers 2014

2011
Lars Heinemann Florian Deißenböck Mario Gleirscher Benjamin Hummel Maximilian Irlbeck

Code repositories on the Internet provide a tremendous amount of freely available open source code that can be reused for building new software. It has been argued that only software reuse can bring the gain of productivity in software construction demanded by the market. However, knowledge about the extent of reuse in software projects is only sparse. To remedy this, we report on an empirical ...

Journal: :ECEASST 2014
Takuya Moriwaki Hiroshi Igaki Yuki Yamanaka Norihiro Yoshida Shinji Kusumoto Katsuro Inoue

Code clone analysis is valuable because it can reveal reuse behaviours efficiently from software repositories. Recently, some code reuse analyses using clone genealogies and code clones over multiple projects were conducted. However, most of the conventional analyses do not consider the developers’ individual difference to reuse behaviors. In this paper, we propose a method for code reuse analy...

2016
Robert Gawlik Benjamin Kollenda Philipp Koppe Behrad Garmany Thorsten Holz

It is a well-known issue that attack primitives which exploit memory corruption vulnerabilities can abuse the ability of processes to automatically restart upon termination. For example, network services like FTP and HTTP servers are typically restarted in case a crash happens and this can be used to defeat Address Space Layout Randomization (ASLR). Furthermore, recently several techniques evol...

2015
Yifan Lu Christopher Hansen

Software exploitation, as used by malware and other kinds of attacks, require the attacker to take control of code execution. Historically, this involves injecting code into memory and using a software vulnerability to execute it. This works because both ARM and x86 uses a modified Harvard architecture which allows code and data memory to be shared. ARMv6 introduced the “execute never”[1] featu...

2015
Takuya MORIWAKI Keisuke HOTTA Hiroshi IGAKI Katsuro INOUE Shinji KUSUMOTO

In the software industry and OSS projects, it is said that source code reuse could improve productivity and reliability of software development, and reduce development time. On the other hand, source code reuse requires professional skills to developers. Ad-hoc reuse might introduce some maintenance problems. The source code reuse analysis for software development organizations is worthy to be ...

Journal: :Information & Software Technology 2017
Rabe Abdalkareem Emad Shihab Juergen Rilling

Context: Source code reuse has been widely accepted as a fundamental activity in software development. Recent studies showed that StackOverflow has emerged as one of the most popular resources for code reuse. Therefore, a plethora of work proposed ways to optimally ask questions, search for answers and find relevant code on StackOverflow. However, little work studies the impact of code reuse fr...

2000
Marcus Brunner

Active networking, where network nodes perform customized processing of packets, is a rapidly expanding field of research. This paper investigates the realization of service management on a Virtual Active Network (VAN), the key concept in our management framework for active networks [1]. A VAN is a generic service offered by the VAN provider to the customer. The VAN abstraction transforms a mul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید