نتایج جستجو برای: return oriented programming

تعداد نتایج: 509816  

2010

Return-oriented programming (ROP), based on return-to-libc and borrowed-code-chunks techniques, is one of the buzzing advanced exploitation techniques these days to bypass NX. There are several practical works using ROP techniques for exploitations on Windows, iPhone OS to bypass DEP and code signing. On most of modern Linux distributions, ASCIIArmor address mapping (which maps libc addresses s...

2002
Jonathan Aldrich

Software engineering focused type inference can enhance programmer productivity in statically typed objectoriented languages. Type inference is a system of automatically inferring the argument and return types of a function. It provides considerable programming convenience, because the programmer can realize the benefits of a statically typed language without manually entering the type annotati...

2017
YANG SONG

Rust is a newly designed systems programming language that aims at safety. However, as a systems language, Rust must be able to manipulate rawmemory and interact with native C codes freely. In this project, we demonstrate how the use of unsafe keyword can potentially undermine the security guarantees of Rust. Specifically, we provideworking demonstrations to show that in some circumstances, vul...

Journal: :European Journal of Operational Research 2016
Mohammad Jeihoonian Masoumeh Kazemi Zanjani Michel Gendreau

Durable products are characterized by their modular structured design as well as their long life cycle. Each class of components involved in the multi-indenture structure of such products requires a different recovery process. Moreover, due to their long life cycle, the return flows are of various quality levels. In this article, we study a closed-loop supply chain in the context of durable pro...

Journal: :CRIS - Bulletin of the Centre for Research and Interdisciplinary Study 2014

2000
J. F. Muzy

In this paper, we provide a simple, “generic” interpretation of multifractal scaling laws and multiplicative cascade process paradigms in terms of volatility correlations. We show that in this context 1/f power spectra, as recently observed in Ref. [20], naturally emerge. We then propose a simple solvable “stochastic volatility” model for return fluctuations. This model is able to reproduce mos...

2016
Yangchun Fu Junghwan Rhee Zhiqiang Lin Zhichun Li Hui Zhang Guofei Jiang

The stack is a critical memory structure to ensure the correct execution of programs because control flow changes through the data stored in it, such as return addresses and function pointers. Thus the stack has been a popular target by many attacks and exploits like stack smashing attacks and return-oriented programming (ROP). We present a novel system to detect the corruption of the stack lay...

2013
Jiaxin Cao Tao Zheng Zhijun Huang Zhitian Lin Chao Yang

since ROP (Return Oriented Programming) has been put forward, it has broken the limit of protection strategy against malware. Finer granularity of control and complete expression make traditional defense against control flow attacks fail. In recent years, defense of ROP has made some progress. Some detection methods based on the short length of gadgets in ROP shellcode largely limit ROP. In thi...

2003
Timothy C. Johnson Andrew Jackson

Recent work by Diether, Malloy, and Scherbina (2002) has established a negative relationship between stock returns and the dispersion of analysts’ earnings forecasts. I offer a simple explanation for this phenomenon based on the interpretation of dispersion as a proxy for unpriced information risk arising when asset values are unobservable. The relationship then follows from a general options-p...

Journal: :CoRR 2013
Mir Sajjad Hussain Talpur

In fact, information systems are the foundation of new productivity sources, medical organizational forms, and erection of a global economy. IoT based healthcare systems play a significant role in ICT and have contribution in growth of medical information systems, which are underpinning of recent medical and economic development strategies. However, to take advantages of IoT, it is essential th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید