نتایج جستجو برای: code reuse attack

تعداد نتایج: 269071  

2007
Duane W. Hybertson David A. Eichmann

For reuse to mature into an institutional context, we must move beyond anecdotal support to cost and estimation models supported by legitimate measures. This implies that the existing measures and models will need to be adapted to properly distinguish and credit reuse when it occurs and when it can occur. Furthermore, the focus of those measures and models may change. Workshop Goals: Assess the...

1990
X. Pintado

Object-oriented programming is considered in the context of software communities – groups of designers and developers sharing knowledge and experience. One way of fostering reuse of this experience is by establishing large collections of reusable object classes. Resulting problems include: Class packaging and class organization – how can classes and their methods be represented to simplify reus...

1996
Jacob L. Cybulski

In this paper we investigate the impact of human cognition on developers ability to effectively reuse software artefacts. We look at the cognitive impediments to and furtherance of software reuse. We review the computing models of human knowledge and reasoning which may assist in the emulation of our abilities to reuse software. Finally we investigate the possibility of integrating human and ma...

1999

We describe the methodology and current features for ML2000, a new-generation design of ML. ML2000 adds a number of features to Standard ML and Caml, providing better support for extensibility and code reuse, while also fixing latent problems. Although none of the features is particularly novel on its own, the combination of features and design methodology are.

1999

We describe the methodology and current features for ML2000, a new-generation design of ML. ML2000 adds a number of features to Standard ML and Caml, providing better support for extensibility and code reuse, while also fixing latent problems. Although none of the features is particularly novel on its own, the combination of features and design methodology are.

2007
Paulo Borba

In this work we propose an extension of the MooZ formal speciication language with support for parameterized packages. This enhances MooZ's capabilities for software reuse and maintenance in the large. We discuss several design issues for MooZ's structuring mechanisms: the distinction between inheritance and subtyping, values and objects, vertical and horizontal composition, packages and classe...

1988
J. M. Perry Linda Hutz Pesante

This report presents a perspective on software reuse in the context of "ideal" software development capabilities. Software reuse is viewed as a means of achieving—or at least approximating—the ideal capabilities. A generic application and development model is proposed for unifying various types of software reuse. The model can be initially formulated as a project family architecture and produce...

2005
Yongbeom Kim Leonard N. Stern Edward A. Stohr

Software reuse has been considered as a means to help solve the software development crisis. This paper surveys recent work based on the broad framework of software reusability research, and suggests directions for future research. We address general, technical, and nontechnical issues of software reuse, and conclude that reuse needs to be viewed in the context of a total systems approach. We a...

2003
Novia Indriaty Admodisastro Sellappan Palaniappan

Software reuse has been recognised as an attractive idea with an obvious payoff to achieve software that is faster, better and cheaper. One important component to be highlighted in designing reusable object-oriented software is design patterns. Design patterns describe a commonly recurring structure of communicating components that solve a general design problem in a particular context. An impo...

Journal: :Journal of Systems Architecture 2022

Memory corruption attacks such as code injection, reuse, and non-control data have become widely popular for compromising safety-critical Cyber–Physical Systems (CPS). Moving target defense (MTD) techniques instruction set randomization (ISR), address space (ASR), (DSR) can be used to protect systems against attacks. CPS often use time-triggered architectures guarantee predictable reliable oper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید