Zobrazeno 1 - 10
of 876
pro vyhledávání: '"Control Flow Analysis"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Computer Communications. 182:60-71
A seemingly small change in the software can usually have a big impact. Impact analysis is an assessment of multiple risks associated with the changes. Research over the past 20 years has shown that impact analysis can decrease the time and effort ne
Visitors and Rewriters are a well-known and powerful design pattern for processing regular data structures in a declarative way, while still writing imperative code. The authors' "umod" model generator creates Java data models from a concise and alge
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e475f0869cc548f20e867da22d7c9ee9
Autor:
Jay McCarthy, Kimball Germane
Publikováno v:
Proceedings of the ACM on Programming Languages. 5:1-28
Theories of higher-order must-alias analysis, often under the guise of environment analysis, provide deep behavioral insight. But these theories---in particular those that are most insightful otherwise---can reason about recursion only in limited cas
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IET Information Security. 14:352-364
Logic vulnerabilities are largely dependent on the expected functions of web applications. Their appearance depends on both application logic and related security policy which may change based on modifications in business requirements. Accordingly, t
Autor:
Germane, Kimball, Adams, Michael D.
Publikováno v:
Programming Languages and Systems
garbage collection and the use of pushdown systems each enhance the precision of control-flow analysis (CFA). However, their respective needs conflict: abstract garbage collection requires the stack but pushdown systems obscure it. Though several exi
Publikováno v:
ACM Transactions on Embedded Computing Systems. 19:1-22
Code-reuse attack is a concrete threat to computing systems because it can evade conventional security defenses. Control flow integrity (CFI) is proposed to repel this threat. However, former implementations of CFI suffer from two major drawbacks: co
Autor:
Benoît Montagu, Thomas Jensen
Publikováno v:
PLDI 2021-42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation
PLDI 2021-42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, Jun 2021, Virtual, Canada. pp.1-15, ⟨10.1145/3453483.3454057⟩
PLDI
PLDI 2021-42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, Jun 2021, Virtual, Canada. pp.1-15, ⟨10.1145/3453483.3454057⟩
PLDI
International audience; We define a small-step semantics for the untyped λ-calculus, that traces the β-reductions that occur during evaluation. By abstracting the computation traces, we reconstruct-CFA using abstract interpretation, and justify con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1ea4f28aa10839a17ffc9448e10b8d84
https://hal.inria.fr/hal-03266981/document
https://hal.inria.fr/hal-03266981/document