Code reuse

Results: 184



#Item
31Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
32Program Fracture and Recombination for Efficient Automatic Code Reuse Peter Amidon Eli Davis, Stelios Sidiroglou-Douskos, and Martin Rinard

Program Fracture and Recombination for Efficient Automatic Code Reuse Peter Amidon Eli Davis, Stelios Sidiroglou-Douskos, and Martin Rinard

Add to Reading List

Source URL: www.ieee-hpec.org

Language: English - Date: 2015-11-09 14:56:21
    33Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

    Code reuse through polymorphic variants∗ Jacques Garrigue November 8, 2000 Abstract Their support for code reuse has made object-oriented languages popular. However,

    Add to Reading List

    Source URL: www.math.nagoya-u.ac.jp

    Language: English - Date: 2005-02-23 20:45:34
    34Size Does Matter Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard Enes Gökta¸s Vrije Universiteit Amsterdam, The Netherlands

    Size Does Matter Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard Enes Gökta¸s Vrije Universiteit Amsterdam, The Netherlands

    Add to Reading List

    Source URL: www.cs.stevens.edu

    Language: English - Date: 2015-09-30 20:38:13
      35ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, and Wenke Lee School of Computer Science, Georgia Institute of Technology

      ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, and Wenke Lee School of Computer Science, Georgia Institute of Technology

      Add to Reading List

      Source URL: wenke.gtisc.gatech.edu

      Language: English - Date: 2015-09-04 21:45:19
        36A Framework for Enhancing Data Reuse via Associative Reordering Kevin Stock1 Louis-No¨el Pouchet3 1

        A Framework for Enhancing Data Reuse via Associative Reordering Kevin Stock1 Louis-No¨el Pouchet3 1

        Add to Reading List

        Source URL: www.grosser.es

        Language: English - Date: 2015-08-09 08:54:51
        37Size Does Matter Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard Enes Gökta¸s Vrije Universiteit Amsterdam, The Netherlands

        Size Does Matter Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard Enes Gökta¸s Vrije Universiteit Amsterdam, The Netherlands

        Add to Reading List

        Source URL: users.ics.forth.gr

        Language: English - Date: 2014-07-21 05:42:47
          38Chapter 2, in Finding Source Code on the Web for Remix and Reuse, S.E. Sim and R.E. Gallardo-Valencia (eds.), Springer Science+Business Media New York, pp.17-34, June, 2013. Unweaving Code Search toward Remixing-Centered

          Chapter 2, in Finding Source Code on the Web for Remix and Reuse, S.E. Sim and R.E. Gallardo-Valencia (eds.), Springer Science+Business Media New York, pp.17-34, June, 2013. Unweaving Code Search toward Remixing-Centered

          Add to Reading List

          Source URL: www.kidresearch.jp

          Language: English - Date: 2013-05-29 12:03:09
            392013 IEEE Symposium on Security and Privacy  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

            2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

            Add to Reading List

            Source URL: wwwx.cs.unc.edu

            Language: English - Date: 2014-09-05 15:38:44
            402013 17th European Conference on Software Maintenance and Reengineering  An Exploratory Study of Cloning in Industrial Software Product Lines Yael Dubinsky∗ , Julia Rubin∗† , Thorsten Berger‡§ , Slawomir Duszyns

            2013 17th European Conference on Software Maintenance and Reengineering An Exploratory Study of Cloning in Industrial Software Product Lines Yael Dubinsky∗ , Julia Rubin∗† , Thorsten Berger‡§ , Slawomir Duszyns

            Add to Reading List

            Source URL: people.csail.mit.edu

            Language: English - Date: 2014-11-01 02:00:44