نتایج جستجو برای: code reuse attack

تعداد نتایج: 269071  

Journal: :Proceedings of the ACM on programming languages 2023

The pervasive brittleness of deep neural networks has attracted significant attention in recent years. A particularly interesting finding is the existence adversarial examples, imperceptibly perturbed natural inputs that induce erroneous predictions state-of-the-art models. In this paper, we study a different type examples specific to code models, called discrete , which are created through pro...

2016
Claudia Eckert

As the threat potential of Code-Reuse Attacks (CRAs) is rising we want to develop a tool that can mitigate such state-of-the-art attacks (e.g., the attack dubbed Counterfeit Object-Oriented Programming (COOP)). This attack is particularly hard to defend against since traditional Control Flow Integrity (CFI) approaches are useless. Based on source code recompilation techniques we want to harden ...

1995
Yih-Farn Chen Balachander Krishnamurthy Kiem-Phong Vo

Software reuse is an eeective way to gain productivity in constructing software systems. In order to continuously monitor the progress of reuse in the context of a project, we need an objective and repeatable way to measure the extent of reuse. This paper proposes a model and methodology to automatically compute a general objective reuse measure from the source code of applications and reusable...

2010
Kung-Kiu Lau Ioannis Ntalamagkas Cuong M. Tran Tauseef Rana

Design patterns are typically defined informally, albeit in a standard format, and have to be programmed by the software designer into each new application. Thus although patterns support solution reuse, in practice this does not translate into code reuse. In this paper we argue that to achieve code reuse, patterns should be defined and used in the context of software component models. We show ...

2016
Giorgi Maisuradze Michael Backes Christian Rossow

Despite numerous attempts to mitigate code-reuse attacks, Return-Oriented Programming (ROP) is still at the core of exploiting memory corruption vulnerabilities. Most notably, in JIT-ROP, an attacker dynamically searches for suitable gadgets in executable code pages, even if they have been randomized. JIT-ROP seemingly requires that (i) code is readable (to find gadgets at run time) and (ii) ex...

2013
Josip Maras Jan Carlson Ivica Crnkovic

Client-side applications often contain similar features and facilitating reuse could offer considerable benefits in terms of faster development. Unfortunately, due to the specifics of prevailing technologies, the techniques and tools used to support reuse are not as advanced as in other software engineering disciplines and the main method of reuse is still copy-pasting code. Copy-paste reuse ca...

2004
Youssef Hassoun Roger Johnson Steve Counsell

Applying reuse-supporting techniques has the potential for increasing software productivity, shortening development time and decreasing maintenance costs. However, at present, there is no methodology incorporating reuse as a standard development practice and the question of which factors affect reuse, their level of significance and assessment is still a controversial issue. Code reuse, on the ...

2014
Mohammed Daubal Nathan Duncan Delmar B. Davis Hazeline U. Asuncion

A goal of reusing source code is to lower development costs; however, reuse techniques usually require additional costs in creating generic source code and retrieving the appropriate source code from a code repository. In this paper, we present Domain Data Concept (DDC) Tracer, a novel traceability technique that facilitates reuse in layered applications in a costeffective way. While current tr...

2006
Eugenio Capra Chiara Francalanci Francesco Merlo Marcello Tosetti

This paper analyzes the reuse choices made by open source developers and relates them to cost efficiency. We make a distinction between the commonality among applications and the actual reuse of code. The former represents the similarity between the requirements of different applications and, consequently, the functionalities that they provide. The latter represents the actual reuse of code. No...

Journal: :Journal of Systems and Software 2021

Software reuse is a widely adopted practice among both researchers and practitioners. The relation between security can go ways: system become more secure by relying on mature dependencies, or insecure exposing larger attack surface via exploitable dependencies. To follow up previous study shed light this subject, we further examine the association software threats. In particular, empirically i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید