Code reuse

Results: 184



#Item
31Computer programming / Software engineering / Computing / Computer security / Control-flow integrity / Code reuse / Return-oriented programming / Subroutine / Control flow / Flow graph / Pointer

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
32

Program Fracture and Recombination for Efficient Automatic Code Reuse Peter Amidon Eli Davis, Stelios Sidiroglou-Douskos, and Martin Rinard

Add to Reading List

Source URL: www.ieee-hpec.org

Language: English - Date: 2015-11-09 14:56:21
    33Software engineering / Computer programming / Declarative programming / Functional programming / Data types / Type theory / Eval / Standard ML / Anonymous function / HindleyMilner type system / OCaml / Polymorphism

    Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

    Add to Reading List

    Source URL: www.math.nagoya-u.ac.jp

    Language: English - Date: 2005-02-23 20:45:34
    34

    Size Does Matter Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard Enes Gökta¸s Vrije Universiteit Amsterdam, The Netherlands

    Add to Reading List

    Source URL: www.cs.stevens.edu

    Language: English - Date: 2015-09-30 20:38:13
      35

      ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, and Wenke Lee School of Computer Science, Georgia Institute of Technology

      Add to Reading List

      Source URL: wenke.gtisc.gatech.edu

      Language: English - Date: 2015-09-04 21:45:19
        36Software engineering / Computer programming / Compiler optimizations / Computing / Stencil code / Loop optimization / For loop / Polytope model / Optimizing compiler / OpenMP / Loop unrolling / Foreach loop

        A Framework for Enhancing Data Reuse via Associative Reordering Kevin Stock1 Louis-No¨el Pouchet3 1

        Add to Reading List

        Source URL: www.grosser.es

        Language: English - Date: 2015-08-09 08:54:51
        37

        Size Does Matter Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard Enes Gökta¸s Vrije Universiteit Amsterdam, The Netherlands

        Add to Reading List

        Source URL: users.ics.forth.gr

        Language: English - Date: 2014-07-21 05:42:47
          38

          Chapter 2, in Finding Source Code on the Web for Remix and Reuse, S.E. Sim and R.E. Gallardo-Valencia (eds.), Springer Science+Business Media New York, pp.17-34, June, 2013. Unweaving Code Search toward Remixing-Centered

          Add to Reading List

          Source URL: www.kidresearch.jp

          Language: English - Date: 2013-05-29 12:03:09
            39Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

            2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

            Add to Reading List

            Source URL: wwwx.cs.unc.edu

            Language: English - Date: 2014-09-05 15:38:44
            40Cloning / Cryobiology / Genetics / Phone cloning / Clone / Software product line / A Number / Code reuse / Product family engineering / Biology / Molecular biology / Software

            2013 17th European Conference on Software Maintenance and Reengineering An Exploratory Study of Cloning in Industrial Software Product Lines Yael Dubinsky∗ , Julia Rubin∗† , Thorsten Berger‡§ , Slawomir Duszyns

            Add to Reading List

            Source URL: people.csail.mit.edu

            Language: English - Date: 2014-11-01 02:00:44
            UPDATE