نتایج جستجو برای: code reuse attack

تعداد نتایج: 269071  

Journal: :Modeling and Analysis of Information Systems 2019

1998
Neelam Soundarajan Stephen Fridella

In the Object-Oriented approach a designer can, given an existing base class, use inheritance to build a derived class that extends, or that slightly differs from the base class. But in order to exploit the full potential of inheritance to build systems incrementally, the designer must also be able to reason about the derived class incrementally. This paper presents a specification notation and...

Journal: :DEStech Transactions on Computer Science and Engineering 2017

2013
Richard Skowyra Kelly Casteel Hamed Okhravi Nickolai Zeldovich William W. Streilein

Since the introduction of return-oriented programming, increasingly complex defenses and subtle attacks that bypass them have been proposed. Unfortunately the lack of a unifying threat model among code reuse security papers makes it difficult to evaluate the effectiveness of defenses, and answer critical questions about the interoperability, composability, and efficacy of existing defensive tec...

Journal: :Management Science 2008
Stefan Haefliger Georg von Krogh Sebastian Spaeth

Code reuse is a form of knowledge reuse in software development, which is fundamental to innovation in many fields. Yet, to date, there has been no systematic investigation of code reuse in open source software projects. This study uses quantitative and qualitative data gathered from a sample of six open source software projects to explore two sets of research questions derived from the literat...

2013
Ian Jermyn

Password security is essential for user authentication on small networking system as well large networking system. Till today many researchers introduced various methods to protect passwords on network. Passwords are prone to various types of attacks like brute force attack, password reuse attack, password stealing attack, password cracking attack, etc. This paper gives review on different meth...

2011
Thomas Fuhr Henri Gilbert Jean-René Reinhard Marion Videau

In this paper we investigate the security of the two most recent versions of the message authentication code 128-EIA3, which is considered for adoption as a third integrity algorithm in the emerging 3GPP standard LTE. We first present an efficient existential forgery attack against the June 2010 version of the algorithm. This attack allows, given any message and the associated MAC value under a...

Journal: :Journal of Information Security and Applications 2016

Journal: :IEEE Transactions on Software Engineering 2023

Code reuse is an important part of software development. The adoption code practices especially common among Node.js developers. package manager, NPM, indexes over 1 Million packages and developers often seek out to solve programming tasks. Due the vast number packages, selecting right difficult time consuming. With goal improving productivity that heavily through third-party we present <italic...

Journal: :IEEE Transactions on Computers 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید