نتایج جستجو برای: return oriented programming
تعداد نتایج: 509816 فیلتر نتایج به سال:
Return-oriented programming (ROP), based on return-to-libc and borrowed-code-chunks techniques, is one of the buzzing advanced exploitation techniques these days to bypass NX. There are several practical works using ROP techniques for exploitations on Windows, iPhone OS to bypass DEP and code signing. On most of modern Linux distributions, ASCIIArmor address mapping (which maps libc addresses s...
Software engineering focused type inference can enhance programmer productivity in statically typed objectoriented languages. Type inference is a system of automatically inferring the argument and return types of a function. It provides considerable programming convenience, because the programmer can realize the benefits of a statically typed language without manually entering the type annotati...
Rust is a newly designed systems programming language that aims at safety. However, as a systems language, Rust must be able to manipulate rawmemory and interact with native C codes freely. In this project, we demonstrate how the use of unsafe keyword can potentially undermine the security guarantees of Rust. Specifically, we provideworking demonstrations to show that in some circumstances, vul...
Durable products are characterized by their modular structured design as well as their long life cycle. Each class of components involved in the multi-indenture structure of such products requires a different recovery process. Moreover, due to their long life cycle, the return flows are of various quality levels. In this article, we study a closed-loop supply chain in the context of durable pro...
Modelling fluctuations of financial time series: from cascade process to stochastic volatility model
In this paper, we provide a simple, “generic” interpretation of multifractal scaling laws and multiplicative cascade process paradigms in terms of volatility correlations. We show that in this context 1/f power spectra, as recently observed in Ref. [20], naturally emerge. We then propose a simple solvable “stochastic volatility” model for return fluctuations. This model is able to reproduce mos...
The stack is a critical memory structure to ensure the correct execution of programs because control flow changes through the data stored in it, such as return addresses and function pointers. Thus the stack has been a popular target by many attacks and exploits like stack smashing attacks and return-oriented programming (ROP). We present a novel system to detect the corruption of the stack lay...
since ROP (Return Oriented Programming) has been put forward, it has broken the limit of protection strategy against malware. Finer granularity of control and complete expression make traditional defense against control flow attacks fail. In recent years, defense of ROP has made some progress. Some detection methods based on the short length of gadgets in ROP shellcode largely limit ROP. In thi...
Recent work by Diether, Malloy, and Scherbina (2002) has established a negative relationship between stock returns and the dispersion of analysts’ earnings forecasts. I offer a simple explanation for this phenomenon based on the interpretation of dispersion as a proxy for unpriced information risk arising when asset values are unobservable. The relationship then follows from a general options-p...
In fact, information systems are the foundation of new productivity sources, medical organizational forms, and erection of a global economy. IoT based healthcare systems play a significant role in ICT and have contribution in growth of medical information systems, which are underpinning of recent medical and economic development strategies. However, to take advantages of IoT, it is essential th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید