Zobrazeno 1 - 10
of 131
pro vyhledávání: '"Code Access Security"'
Autor:
Samer Hassan, Primavera De Filippi
Publikováno v:
First Monday
First Monday, University of Illinois at Chicago Library, 2016
First Monday; Volume 21, Number 12-5 December 2016
First Monday, University of Illinois at Chicago Library, 2016
First Monday; Volume 21, Number 12-5 December 2016
International audience; " Code is law " refers to the idea that, with the advent of digital technology, code has progressively established itself as the predominant way to regulate the behavior of Internet users. Yet, while computer code can enforce
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aa04d64758b2ed22ae5667fa7dabcb52
Autor:
Michael J. Mior
Publikováno v:
DBPL
Server-side execution is a well-known method for improving the performance of database applications. Running code on the database server eliminates round trips to the client application resulting in significantly reduced latency. However, the common
Publikováno v:
2017 IEEE European Symposium on Security and Privacy (EuroS&P)
Chen, X, Bos, H & Giuffrida, C 2017, CodeArmor : Virtualizing the Code Space to Counter Disclosure Attacks . in Proceedings-2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017 ., 7962000, Institute of Electrical and Electronics Engineers Inc., pp. 514-529, 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017, Paris, France, 26/04/17 . https://doi.org/10.1109/EuroSP.2017.17
Proceedings-2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017, 514-529
STARTPAGE=514;ENDPAGE=529;TITLE=Proceedings-2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017
EuroS&P
Chen, X, Bos, H & Giuffrida, C 2017, CodeArmor : Virtualizing the Code Space to Counter Disclosure Attacks . in Proceedings-2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017 ., 7962000, Institute of Electrical and Electronics Engineers Inc., pp. 514-529, 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017, Paris, France, 26/04/17 . https://doi.org/10.1109/EuroSP.2017.17
Proceedings-2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017, 514-529
STARTPAGE=514;ENDPAGE=529;TITLE=Proceedings-2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017
EuroS&P
Code diversification is an effective strategy to prevent modern code-reuse exploits. Unfortunately, diversification techniques are inherently vulnerable to information disclosure. Recent diversification-aware ROP exploits have demonstrated that code
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::36bea9073c222200fe2239acd497c15e
https://research.vu.nl/en/publications/29895a35-e4c4-4560-8581-2c2d59d6095d
https://research.vu.nl/en/publications/29895a35-e4c4-4560-8581-2c2d59d6095d
Publikováno v:
SANER
Developers use Question and Answer (Q&A) websites to exchange knowledge and expertise. Stack Overflow is a popular Q&A website where developers discuss coding problems and share code examples. Although all Stack Overflow posts are free to access, cod
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f11487409602b2a8fd39eb7d1941e1cb
http://arxiv.org/abs/1703.03897
http://arxiv.org/abs/1703.03897
Publikováno v:
Applied Mechanics and Materials. :1781-1784
This paper introduces the present situation of the two-dimensional code and problems in two-dimensional code in the process of development,and discusses the security problem of two-dimensional code decoding information,then proposes a human fingerpri
Publikováno v:
CLEI Selected Papers
Security assurance is a property that ensures that the application code behaves consistently with the access control policy specified at the design level. Security assurance proofs are valid as long as software engineers do not modify the generated c
Publikováno v:
CSE/EUC/DCABES
We propose directive-based automatic code generation for a multiple-precision code from a C code with double precision. The multiple-precision code uses the GNU Multiple Precision Arithmetic Library (GMP). Our code generation functions can be separat
Publikováno v:
DSN
Code identity is a fundamental concept for authenticated operations in Trusted Computing. In today's approach, the overhead of assigning an identity to a protected service increases linearly with the service code size. In addition, service code size
Autor:
Michalis Polychronakis, Nathan Otterness, Fabian Monrose, Jan Werner, George Baltas, Rob Dallara, Kevin Z. Snow
Publikováno v:
AsiaCCS
Memory disclosure vulnerabilities enable an adversary to successfully mount arbitrary code execution attacks against applications via so-called just-in-time code reuse attacks, even when those applications are fortified with fine-grained address spac
Autor:
Bruno C. d. S. Oliveira, Tomas Tauber
Publikováno v:
MODULARITY
Every fragment of code we write has dependencies and associated metadata. Code dependencies range from local references and standard library definitions to external third party libraries. Metadata spans from within source code files (hierarchical nam