Binary code

Results: 292



#Item
51Computing / Software / Software bugs / Programming language implementation / Subroutines / Portable Executable / Position-independent code / Object file / Dynamic linker / Stack buffer overflow / Buffer overflow / Return-to-libc attack

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2015-06-23 06:38:59
52Software / System software / Computing / Software maintenance / Software release / Binary translation / Patch / Dynamic software updating / Linux kernel / System call / Google Native Client / KGraft

DynSec: On-the-fly Code Rewriting and Repair Mathias Payer ETH Zurich and UC Berkeley Boris Bluntschli ETH Zurich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
53Bioinformatics / Proteomics / SEQUEST / Greylag goose / FASTA / Mathematical and theoretical biology / Biology / Biotechnology

Release Notes Version 0.2.2 • Add the sequest-rally code variant. This is an adaptation of the greylag code to run the Yates’ lab’s SEQUEST binary. Although it may not be useful in itself, it contains a number of

Add to Reading List

Source URL: greylag.org

Language: English - Date: 2009-11-02 09:32:36
54Coding theory / Error detection and correction / Discrete mathematics / Mathematics / Low-density parity-check code / Information / BCJR algorithm / Belief propagation / Linear code / Turbo code / Information theory / Generalized distributive law

SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY 100 Binary Intersymbol Interference Channels: Gallager Codes, Density Evolution and Code

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2002-01-28 14:06:34
55Information theory / Information / Theoretical computer science / Telecommunications engineering / Information-theoretic security / Channel capacity / Channel / Code / Noisy-channel coding theorem / Binary symmetric channel

2748 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 5, MAY 2012 Three-Receiver Broadcast Channels With Common and Confidential Messages

Add to Reading List

Source URL: isl.stanford.edu

Language: English - Date: 2014-08-08 14:33:18
56

Learning to Analyze Binary Computer Code Nathan Rosenblum and Xiaojin Zhu and Barton Miller Computer Sciences Department, University of Wisconsin-Madison. {nater,jerryzhu,bart}@cs.wisc.edu Karen Hunt National Security Ag

Add to Reading List

Source URL: cscads.rice.edu

Language: English - Date: 2009-04-21 16:37:11
    57Binary trees / Information theory / Computing / Information / Coding theory / Huffman coding / Entropy / Prefix code / Anonymizer / Code / Data compression / Redundancy

    Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric Networks Reza Tourani Satyajayant Misra

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:53
    58Procedural programming languages / Cross-platform software / Data types / C / Enumerated type / Type theory / Struct / Abstract Syntax Notation One / D / Binary star / ALGOL 68 / Binary code

    CT for Binary Codes draft-zhang-trans-ct-binary-codes-03 Dacheng Zhang Daniel Kahn Gillmor Changes since IETF91(1)

    Add to Reading List

    Source URL: www.ietf.org

    Language: English - Date: 2015-07-23 03:56:30
    59

    A couple notes on file formats General ideas Avoid complex binary formats that interleave different data streams using chained blocks I Complex code, very slow random access

    Add to Reading List

    Source URL: crcns.org

    Language: English - Date: 2014-12-10 19:22:21
      60

      Binary Code Tenors Thom Shearer

      Add to Reading List

      Source URL: renegades.org

      Language: French - Date: 2012-01-10 18:55:00
        UPDATE