نتایج جستجو برای: code reuse attacks
تعداد نتایج: 245922 فیلتر نتایج به سال:
We present an approach for a lightweight datatype-generic programming in Objective Caml programming language aimed at better code reuse. We show that a large class of transformations usually expressed via recursive functions with pattern matching can be implemented using the single per-type traversal function and the set of objectencoded transformations, which we call transformation objects. Ob...
An automated tool to assist in the understanding of legacy code can be useful both in the areas of software reuse and software maintenance. Most previous work in this area has concentrated on functionally-oriented code. Whereas object-oriented code has been shown to be inherently more reusable than functionally-oriented code, in many cases the eventual reuse of the object-oriented code was not ...
Is it really true that simulation models and simulation software should always be regarded as candidates for reuse, or is it better to be selective? What are the obstacles to simulation software and model reuse? Can these be surmounted and, if so, at what cost? There is a range of levels at which simulation software may be reused, a range of costs to be borne and range of benefits that may be a...
Code reuse is a fundamental aspect of object-oriented programs, and in particular, the mechanisms of inheritance and late binding provide great flexibility in code reuse, without semantical limitations other than typecorrectness. However, modular reasoning about late binding and inheritance is challenging, and formal reasoning approaches place semantical restrictions on code reuse in order to p...
Code completion is one of the techniques used for realizing efficient code implementations. Code completion means adding the lacking code required for finishing a given task. Recently, some researchers have proposed code completion techniques that are intended to support code reuse. However, these existing techniques are designed to support the following programming steps. They cannot add neces...
Despite its long history and its benefits, software reuse has yet to become a common practise among software programmers. While there is much ongoing research, it focuses on large-scale organisation-level techniques and methodologies. There is very little research that considers reuse at the personal level as an important factor. The lack of focus and tool support has limited the potential for ...
The two-dimensional (2D) block spread code division multiple access (CDMA) can avoid the uplink multiple-access interference with low-complexity single-user detection in a slow fading channel and, therefore, is very attractive. In the 2D spreading, orthogonal variable spreading factor (OVSF) is used for spreading; an important problem is how to efficiently assign the limited resource of OVSF co...
A new binary software randomization and ControlFlow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launched by informed adversaries who possess full knowledge of the inmemory code layout of victim programs. The defense mitigates a recent wave of implementation disclosure attacks, by which adversaries can exfiltrate in-memory code det...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید