نتایج جستجو برای: code reuse attack
تعداد نتایج: 269071 فیلتر نتایج به سال:
The pervasive brittleness of deep neural networks has attracted significant attention in recent years. A particularly interesting finding is the existence adversarial examples, imperceptibly perturbed natural inputs that induce erroneous predictions state-of-the-art models. In this paper, we study a different type examples specific to code models, called discrete , which are created through pro...
As the threat potential of Code-Reuse Attacks (CRAs) is rising we want to develop a tool that can mitigate such state-of-the-art attacks (e.g., the attack dubbed Counterfeit Object-Oriented Programming (COOP)). This attack is particularly hard to defend against since traditional Control Flow Integrity (CFI) approaches are useless. Based on source code recompilation techniques we want to harden ...
Software reuse is an eeective way to gain productivity in constructing software systems. In order to continuously monitor the progress of reuse in the context of a project, we need an objective and repeatable way to measure the extent of reuse. This paper proposes a model and methodology to automatically compute a general objective reuse measure from the source code of applications and reusable...
Design patterns are typically defined informally, albeit in a standard format, and have to be programmed by the software designer into each new application. Thus although patterns support solution reuse, in practice this does not translate into code reuse. In this paper we argue that to achieve code reuse, patterns should be defined and used in the context of software component models. We show ...
Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP) is still at the core of exploiting memory corruption vulnerabilities. Most notably, in JIT-ROP, an attacker dynamically searches for suitable gadgets in executable code pages, even if they have been randomized. JIT-ROP seemingly requires that (i) code is readable (to find gadgets at run time) and (ii) ex...
Client-side applications often contain similar features and facilitating reuse could offer considerable benefits in terms of faster development. Unfortunately, due to the specifics of prevailing technologies, the techniques and tools used to support reuse are not as advanced as in other software engineering disciplines and the main method of reuse is still copy-pasting code. Copy-paste reuse ca...
Applying reuse-supporting techniques has the potential for increasing software productivity, shortening development time and decreasing maintenance costs. However, at present, there is no methodology incorporating reuse as a standard development practice and the question of which factors affect reuse, their level of significance and assessment is still a controversial issue. Code reuse, on the ...
A goal of reusing source code is to lower development costs; however, reuse techniques usually require additional costs in creating generic source code and retrieving the appropriate source code from a code repository. In this paper, we present Domain Data Concept (DDC) Tracer, a novel traceability technique that facilitates reuse in layered applications in a costeffective way. While current tr...
This paper analyzes the reuse choices made by open source developers and relates them to cost efficiency. We make a distinction between the commonality among applications and the actual reuse of code. The former represents the similarity between the requirements of different applications and, consequently, the functionalities that they provide. The latter represents the actual reuse of code. No...
Software reuse is a widely adopted practice among both researchers and practitioners. The relation between security can go ways: system become more secure by relying on mature dependencies, or insecure exposing larger attack surface via exploitable dependencies. To follow up previous study shed light this subject, we further examine the association software threats. In particular, empirically i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید