Identifying Memory Allocation Patterns in HEP Software
نویسندگان
چکیده
منابع مشابه
Identifying the software and their families using the exploration techniques of sequential patterns in dynamic analysis
Nowadays, crypto-ransomware is considered as one of the most threats in cybersecurity. Crypto ransomware removes data access by encrypting valuable data and requests a ransom payment to allow data decryption. As ransomware is still new in the field of cybersecurity, there are few pieces of research focusing on detecting ransomware samples. Most published works considered System File and process...
متن کاملIdentifying Change Patterns in Software History
Traditional algorithms for detecting differences in source code focus on differences between lines. As such, little can be learned about abstract changes that occur over time within a project. Structural differencing on the program’s abstract syntax tree reveals changes at the syntactic level within code, which allows us to further process the differences to understand their meaning. We propose...
متن کاملPublication patterns in HEP computing
An overview of the evolution of computing-oriented publications in high energy physics following the start of operation of LHC. Quantitative analyses are illustrated, which document the production of scholarly papers on computing-related topics by high energy physics experiments and core tools projects, and the citations they receive. Several scientometric indicators are analyzed to characteriz...
متن کاملIdentifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
Privilege separation is a widely used technique to secure complex software systems. With privilege separation, software components are divided into several partitions and these partitions can only communicate through limited interfaces. However, the interfaces still provide a channel for one partition to influence code in other partitions. As a result, certain memory access patterns can be leve...
متن کاملUnderstanding and identifying useful patterns in location-based software
As mobile devices have become more and more popular, we are seeing more location-based applications on handheld devices. Since the screen size of a handheld device is very limited, using a map on such kind of devices can be quite difficult. To make these applications easier to use, we want to use a situation model to provide user a better service. In this paper, we analyze user map operations a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2017
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/898/7/072031