نتایج جستجو برای: code reuse attacks

تعداد نتایج: 245922  

Journal: :CoRR 2018
Dmitri Boulytchev

We present an approach for a lightweight datatype-generic programming in Objective Caml programming language aimed at better code reuse. We show that a large class of transformations usually expressed via recursive functions with pattern matching can be implemented using the single per-type traversal function and the set of objectencoded transformations, which we call transformation objects. Ob...

1995
Letha H. Etzkorn Carl G. Davis

An automated tool to assist in the understanding of legacy code can be useful both in the areas of software reuse and software maintenance. Most previous work in this area has concentrated on functionally-oriented code. Whereas object-oriented code has been shown to be inherently more reusable than functionally-oriented code, in many cases the eventual reuse of the object-oriented code was not ...

Journal: :ACM Transactions on Privacy and Security 2019

2002
Michael Pidd

Is it really true that simulation models and simulation software should always be regarded as candidates for reuse, or is it better to be selective? What are the obstacles to simulation software and model reuse? Can these be surmounted and, if so, at what cost? There is a range of levels at which simulation software may be reused, a range of costs to be borne and range of benefits that may be a...

2016
Olaf Owe

Code reuse is a fundamental aspect of object-oriented programs, and in particular, the mechanisms of inheritance and late binding provide great flexibility in code reuse, without semantical limitations other than typecorrectness. However, modular reasoning about late binding and inheritance is challenging, and formal reasoning approaches place semantical restrictions on code reuse in order to p...

2015
Tomoya Ishihara Yoshiki Higo Shinji Kusumoto

Code completion is one of the techniques used for realizing efficient code implementations. Code completion means adding the lacking code required for finishing a given task. Recently, some researchers have proposed code completion techniques that are intended to support code reuse. However, these existing techniques are designed to support the following programming steps. They cannot add neces...

2006
Min-Sheng Hsieh Ewan D. Tempero

Despite its long history and its benefits, software reuse has yet to become a common practise among software programmers. While there is much ongoing research, it focuses on large-scale organisation-level techniques and methodologies. There is very little research that considers reuse at the personal level as an important factor. The lack of focus and tool support has limited the potential for ...

Journal: :Wireless Communications and Mobile Computing 2014
Qiyue Yu Weixiao Meng Fumiyuki Adachi

The two-dimensional (2D) block spread code division multiple access (CDMA) can avoid the uplink multiple-access interference with low-complexity single-user detection in a slow fading channel and, therefore, is very attractive. In the 2D spreading, orthogonal variable spreading factor (OVSF) is used for spreading; an important problem is how to efficiently assign the limited resource of OVSF co...

2015
Vishwath Mohan Per Larsen Stefan Brunthaler Kevin W. Hamlen Michael Franz

A new binary software randomization and ControlFlow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launched by informed adversaries who possess full knowledge of the inmemory code layout of victim programs. The defense mitigates a recent wave of implementation disclosure attacks, by which adversaries can exfiltrate in-memory code det...

Journal: :Information Management & Computer Security 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید