Self-modifying code

Results: 26



#Item
1ARMlock: Hardware-based Fault Isolation for ARM Yajin Zhou, Xiaoguang Wang, Yue Chen, and Zhi Wang North Carolina State University Xi’an Jiaotong University Florida State University

ARMlock: Hardware-based Fault Isolation for ARM Yajin Zhou, Xiaoguang Wang, Yue Chen, and Zhi Wang North Carolina State University Xi’an Jiaotong University Florida State University

Add to Reading List

Source URL: yajin.org

Language: English - Date: 2016-06-04 10:52:06
2Writing self-adaptive codes for heterogeneous systems

Writing self-adaptive codes for heterogeneous systems

Add to Reading List

Source URL: www.des.udc.es

Language: English - Date: 2014-06-30 06:44:25
3Noise-Based Testing and Analysis of Multi-threaded C/C++ Programs on the Binary Level

Noise-Based Testing and Analysis of Multi-threaded C/C++ Programs on the Binary Level

Add to Reading List

Source URL: faculty.uoit.ca

Language: English - Date: 2012-07-17 10:09:04
4CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters Yubin Xia† ‡, Yutao Liu† ‡, Haibo Chen†, Binyu Zang‡ †Institute of Parallel and Distributed Systems, Shanghai Jiao Tong Unive

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-08-23 22:16:01
5Generating Low-Overhead Dynamic Binary Translators Mathias Payer Thomas R. Gross  ETH Zurich, Switzerland

Generating Low-Overhead Dynamic Binary Translators Mathias Payer Thomas R. Gross ETH Zurich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
6Fine-Grained User-Space Security Through Virtualization Mathias Payer Thomas R. Gross

Fine-Grained User-Space Security Through Virtualization Mathias Payer Thomas R. Gross

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
7Fast Binary Translation: Translation Efficiency and Runtime Efficiency Mathias Payer Department of Computer Science ETH Zurich Abstract—Fast binary translation is a key component for

Fast Binary Translation: Translation Efficiency and Runtime Efficiency Mathias Payer Department of Computer Science ETH Zurich Abstract—Fast binary translation is a key component for

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
8Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Analyzing Network Traffic To Detect Self-Decrypting ∗ Exploit Code Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Cyber Defense Laboratory, Computer Science Department North Carolina State Universit

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:00
9

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
10Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1  Institute of Computer Science, Foundation for Research & Technology – Hell

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-05-02 06:32:56