نتایج جستجو برای: code reuse attack

تعداد نتایج: 269071  

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2023

Pre-trained programming language (PL) models (such as CodeT5, CodeBERT, GraphCodeBERT, etc.,) have the potential to automate software engineering tasks involving code understanding and generation. However, these operate in natural channel of code, i.e., primarily concerned with human code. They are not robust changes input thus, potentially susceptible adversarial attacks channel. We propose, C...

2011
Manuel Sojer Oliver Alexy Joachim Henkel

Internet code, such as open source software code, which is available for gratis download from the Internet, is becoming an increasingly important element of code reuse in commercial software development. However, when individual developers practice such reuse in ad-hoc fashion, for different reasons they might disregard potentially existing license obligations, thereby causing serious legal, ec...

2016
David Williams-King Graham Gobieski Kent Williams-King James P. Blake Xinhao Yuan Patrick Colp Michelle Zheng Vasileios P. Kemerlis Junfeng Yang William Aiello

While code injection attacks have been virtually eliminated on modern systems, programs today remain vulnerable to code reuse attacks. Particularly pernicious are Just-In-Time ROP (JIT-ROP) techniques, where an attacker uses a memory disclosure vulnerability to discover code gadgets at runtime. We designed a code-reuse defense, called Shuffler, which continuously re-randomizes code locations on...

2004
Ramakrishnan Venkitaraman Gopal Gupta

In this paper we consider reusability of software component binaries. Reuse of code at the binary level is important because usually only the machine code for system components is available; vendors do not want to share their source code for proprietary reasons. We develop necessary and sufficient conditions for ensuring that software binaries are reusable and relate them to the coding standard...

Journal: :IEEE Transactions on Information Forensics and Security 2019

Journal: :International Journal of Applied Mathematics and Computer Science 2014

2009
Albert Ambroziewicz Jacek Bojarski Wiktor Nowakowski Tomasz Straszak

This paper presents a tool suite which enables requirementsdriven software reuse. The suite is built around requirements models that are transformed into design and code thus forming so-called ‘software cases’. These requirements models can be compared for software case retrieval and reuse. 1 Motivation and related work Effective reuse of design and code artifacts is associated with mechanisms ...

2005
Giorgio Metta Paul Fitzpatrick Lorenzo Natale

We describe YARP, Yet Another Robot Platform, an open-source project that encapsulates lessons from our experience in building humanoid robots. The goal of YARP is to minimize the effort devoted to infrastructure-level software development by facilitating code reuse, modularity and so maximize research-level development and collaboration. Humanoid robotics is a “bleeding edge” field of research...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید