Identifying Memory Allocation Patterns in HEP Software

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying the software and their families using the exploration techniques of sequential patterns in dynamic analysis

Nowadays, crypto-ransomware is considered as one of the most threats in cybersecurity. Crypto ransomware removes data access by encrypting valuable data and requests a ransom payment to allow data decryption. As ransomware is still new in the field of cybersecurity, there are few pieces of research focusing on detecting ransomware samples. Most published works considered System File and process...

متن کامل

Identifying Change Patterns in Software History

Traditional algorithms for detecting differences in source code focus on differences between lines. As such, little can be learned about abstract changes that occur over time within a project. Structural differencing on the program’s abstract syntax tree reveals changes at the syntactic level within code, which allows us to further process the differences to understand their meaning. We propose...

متن کامل

Publication patterns in HEP computing

An overview of the evolution of computing-oriented publications in high energy physics following the start of operation of LHC. Quantitative analyses are illustrated, which document the production of scholarly papers on computing-related topics by high energy physics experiments and core tools projects, and the citations they receive. Several scientometric indicators are analyzed to characteriz...

متن کامل

Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software

Privilege separation is a widely used technique to secure complex software systems. With privilege separation, software components are divided into several partitions and these partitions can only communicate through limited interfaces. However, the interfaces still provide a channel for one partition to influence code in other partitions. As a result, certain memory access patterns can be leve...

متن کامل

Understanding and identifying useful patterns in location-based software

As mobile devices have become more and more popular, we are seeing more location-based applications on handheld devices. Since the screen size of a handheld device is very limited, using a map on such kind of devices can be quite difficult. To make these applications easier to use, we want to use a situation model to provide user a better service. In this paper, we analyze user map operations a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2017

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/898/7/072031