Software flow control

Results: 1051



#Item
61Computer programming / Software engineering / Computing / Computer security / Control-flow integrity / Code reuse / Return-oriented programming / Subroutine / Control flow / Flow graph / Pointer

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
62Computer programming / Software engineering / Computer programmers / Holism / Source code / Control flow / Code.org / Programming language / Programmer / Infinite loop / Computer / Subroutine

Microsoft Word - KodableHOC_4.docx

Add to Reading List

Source URL: resources.kodable.com

Language: English - Date: 2015-10-15 00:46:09
63Object-oriented programming languages / Control flow / Cross-platform software / Subroutines / C++ / Generator / C++ classes / Foreach loop / Const / Java / D / Return type

COMP 520 FallCode generation (1) COMP 520 Fall 2007

Add to Reading List

Source URL: www.sable.mcgill.ca

Language: English - Date: 2007-11-03 22:46:33
64Computer programming / Software engineering / Holism / Source code / Control flow / Code.org / Programmer / Programming language / Subroutine / Infinite loop / Computer / Robot software

  Programming Curriculum HourofCode™: FifthGrade

Add to Reading List

Source URL: resources.kodable.com

Language: English - Date: 2015-10-15 00:46:10
65Computing / Software engineering / Computer programming / Data types / Control flow / C / DLL injection / Hooking / WindowProc / Subroutines / Callback / Typedef

MWR Labs Walkthrough Windows Kernel Exploitation 101: Exploiting CVESam Brown

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-05 16:42:45
66Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-05-16 23:27:09
67Software engineering / Computer programming / Computing / Lambda calculus / Functional programming / Programming languages / Data types / Control flow / Eval / Bayesian network / Scheme / Lisp

Church: a language for generative models Noah D. Goodman, Vikash K. Mansinghka∗, Daniel M. Roy, Keith Bonawitz & Joshua B. Tenenbaum MIT BCS/CSAIL Cambridge, MA 02139

Add to Reading List

Source URL: stanford.edu

Language: English - Date: 2010-06-23 13:20:14
68Crime prevention / Cryptography / Information governance / National security / Computer security / Covert channel / Information flow / Program slicing / Mandatory access control / Alloy Analyzer / Domain-specific language / Information security

A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2008-08-18 13:41:06
69Software engineering / Computing / Computer programming / Programming language implementation / Compiler optimizations / Information flow / Information theory / Interpreter / Variable / Verilog / For loop / Control flow

Microsoft Word - OOPSLA_DSM07_Paper_v14.doc

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2007-11-15 12:21:17
70Software engineering / Computer programming / Control flow / Foreach loop / Programming language theory

JDK 8: Stream Style Сергей Куксенко , @kuksenk0 The following is intended to outline our general

Add to Reading List

Source URL: 2013.jokerconf.com

Language: English - Date: 2015-02-28 17:19:49
UPDATE