نتایج جستجو برای: code reuse attack

تعداد نتایج: 269071  

2002
Michael Pidd

Is it really true that simulation models and simulation software should always be regarded as candidates for reuse, or is it better to be selective? What are the obstacles to simulation software and model reuse? Can these be surmounted and, if so, at what cost? There is a range of levels at which simulation software may be reused, a range of costs to be borne and range of benefits that may be a...

2012
André Ricardo Abed Grégio Paulo Ĺıcio de Geus Christopher Kruegel Giovanni Vigna

Malicious code (malware) is used to steal sensitive data, to attack corporate networks, and to deliver spam. To silently compromise systems and maintain their access, malware developers usually apply obfuscation techniques that result in a massive amount of malware variants and that can render static analysis approaches ineffective. To address the limitations of static approaches, researchers h...

2016
Olaf Owe

Code reuse is a fundamental aspect of object-oriented programs, and in particular, the mechanisms of inheritance and late binding provide great flexibility in code reuse, without semantical limitations other than typecorrectness. However, modular reasoning about late binding and inheritance is challenging, and formal reasoning approaches place semantical restrictions on code reuse in order to p...

2015
Tomoya Ishihara Yoshiki Higo Shinji Kusumoto

Code completion is one of the techniques used for realizing efficient code implementations. Code completion means adding the lacking code required for finishing a given task. Recently, some researchers have proposed code completion techniques that are intended to support code reuse. However, these existing techniques are designed to support the following programming steps. They cannot add neces...

2006
Min-Sheng Hsieh Ewan D. Tempero

Despite its long history and its benefits, software reuse has yet to become a common practise among software programmers. While there is much ongoing research, it focuses on large-scale organisation-level techniques and methodologies. There is very little research that considers reuse at the personal level as an important factor. The lack of focus and tool support has limited the potential for ...

2003
Pedro Alípio Paulo Carvalho José Neves

We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presented emphasizing the strategies used to inter-operate between the packet capture engine written in C and CLIPS. Some extensions were developed in order to manipulate timestamps, multiple string pattern matching and certaint...

2014
Enes Göktas Elias Athanasopoulos Michalis Polychronakis Herbert Bos Georgios Portokalidis

Code-reuse attacks based on return oriented programming are among the most popular exploitation techniques used by attackers today. Few practical defenses are able to stop such attacks on arbitrary binaries without access to source code. A notable exception are the techniques that employ new hardware, such as Intel’s Last Branch Record (LBR) registers, to track all indirect branches and raise a...

Journal: :Wireless Communications and Mobile Computing 2014
Qiyue Yu Weixiao Meng Fumiyuki Adachi

The two-dimensional (2D) block spread code division multiple access (CDMA) can avoid the uplink multiple-access interference with low-complexity single-user detection in a slow fading channel and, therefore, is very attractive. In the 2D spreading, orthogonal variable spreading factor (OVSF) is used for spreading; an important problem is how to efficiently assign the limited resource of OVSF co...

Journal: :ACM Transactions on Software Engineering and Methodology 2023

Programmers who work with smart contract development often encounter challenges in reusing code from repositories. This is due to the presence of two unknowns that can lead non-functional and functional failures. These are implicit collaborations between functions subtle differences among similar functions. Current mining methods extract syntax semantic knowledge (known knowledge), but they can...

1997
Rebecca A. Walpole Margaret M. Burnett

Although the idea of reusing code is very appealing, effective reuse has long been acknowledged as a problem. To help address the difficulties, many advocate strong management commitment to code reuse, leading to the treatment of code as an asset to be carefully managed in a well-organized repository. However, the advent of the Web may bring a change to this outlook, encouraging informal, loose...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید