51 Hits in 11.0 sec

Software protection for dynamically-generated code

Sudeep Ghosh, Jason Hiser, Jack W. Davidson
2013 Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on - PPREW '13  
We have implemented a PVM system that automatically inserts code into an application to dynamically generate polymorphic software knots.  ...  Used in conjunction with established static techniques, our solution provides a mechanism for protecting PVM-generated code from modification.  ...  In general, all software systems are vulnerable to such attacks, as such, we do not address this class of attacks in our work.  ... 
doi:10.1145/2430553.2430554 dblp:conf/popl/GhoshHD13 fatcat:pkmse5e6s5eqrcj5owlxizbf3y

Design Patterns for Sparse-Matrix Computations on Hybrid CPU/GPU Platforms

Valeria Cardellini, Salvatore Filippone, Damian W.I. Rouson
2014 Scientific Programming  
We apply object-oriented software design patterns to develop code for scientific software involving sparse matrices.  ...  kernels for sparse matrices.  ...  We also thank the anonymous referees whose comment helped us to improve the presentation of this paper.  ... 
doi:10.1155/2014/469753 fatcat:jorjixkn3rf5zoulm6msvk6xlm

Multiparty Session Programming with Global Protocol Combinators [article]

Keigo Imai, Rumyana Neykova, Nobuko Yoshida, Shoji Yuen
2020 arXiv   pre-print
Local behaviours for all processes in a protocol are inferred at once from a global combinator.  ...  The state-of-the-art implementations of the MPST theory rely on (1) runtime linearity checks to ensure correct usage of communication channels and (2) external domain-specific languages for specifying  ...  Acknowledgements We thank Jacques Garrigue and Oleg Kiselyov for their comments on an early version of this paper.  ... 
arXiv:2005.06333v2 fatcat:zqtsntdqjrgbnfmg262g6zattu


Martial Bourquin, Andy King, Edward Robbins
2013 Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on - PPREW '13  
of malware are frequently a simple evolution of existing code, whose differences stem only from a need to avoid detection.  ...  As the volume of malware inexorably rises, comparison of binary code is of increasing importance to security analysts as a method of automatically classifying new malware samples; purportedly new examples  ...  Acknowledgments We would like to thank Thomas Dullien for his fascinating seminar on BinDiff at Dagstuhl seminar 12051 [22] that inspired this study.  ... 
doi:10.1145/2430553.2430557 dblp:conf/popl/BourquinKR13 fatcat:qqwz5zz2h5f3vh6lithgdzakne


David H. Lorenz, Boaz Rosenan
2011 Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications - OOPSLA '11  
In this paper, we contribute: (4) a novel language-oriented approach to LOP for defining and using internal DSLs.  ...  To validate our approach we present a case study in which Cedalion was used by biologists in designing a DNA microarray for molecular Biology research.  ...  Just like Yacc files contain embedded C code, we wish to embed code in one DSL inside code in another DSL.  ... 
doi:10.1145/2048066.2048123 dblp:conf/oopsla/LorenzR11 fatcat:fe35lutmobc4zd2rxiiwzx2xji


David H. Lorenz, Boaz Rosenan
2011 SIGPLAN notices  
In this paper, we contribute: (4) a novel language-oriented approach to LOP for defining and using internal DSLs.  ...  To validate our approach we present a case study in which Cedalion was used by biologists in designing a DNA microarray for molecular Biology research.  ...  Just like Yacc files contain embedded C code, we wish to embed code in one DSL inside code in another DSL.  ... 
doi:10.1145/2076021.2048123 fatcat:tgkkjexvzvhbrcqfl3y3tjqwxe

The abstract state machines method for modular design and analysis of programming languages

Egon Börger
2014 Journal of Logic and Computation  
models, leading from the source code to a machine code view for full-fledged real-life programming languages.  ...  concepts-ASM, ASM ground model and ASM refinement-characterize what became known as ASM method for the design and analysis of any software-based system [57] .  ...  links design and analysis all the way from requirements capture to code development.  ... 
doi:10.1093/logcom/exu077 fatcat:7quppauog5eyvaahlbvlrk7w3u

Using Knowledge Graph Structures for Semantic Interoperability in Electronic Health Records Data Exchanges

Shelly Sachdeva, Subhash Bhalla
2022 Information  
The HL7 Clinical Document Architecture is on its way to adopting this through HL7 templates. Archetypes are the basis for knowledge-based systems as these are means to define clinical knowledge.  ...  This study aims to discover knowledge representation to achieve semantic health data exchange. OpenEHR and CEN TC251 EN 13606 use archetype-based technology for semantic interoperability.  ...  extract all the node paths of the mandatory fields, and then a form is generated.  ... 
doi:10.3390/info13020052 fatcat:see6kyiqlncyjgfzahucbbjqty

A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses [article]

Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu
2019 arXiv   pre-print
While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency purposes, the second generation (i.e., Blockchain 2.0), as represented by Ethereum  ...  Since Ethereum is a new, yet complex, system, it is imperative to have a systematic and comprehensive understanding on its security from a holistic perspective, which is unavailable.  ...  In order to facilitate code-reuse, EVM provides an opcode, DEL-EGATECALL, for embedding a callee contract's bytecode into the bytecode of the caller contract as if it's a piece of the latter's bytecode  ... 
arXiv:1908.04507v1 fatcat:wxddcfw57zginckgt7oucei2nu

Formal hardware specification languages for protocol compliance verification

Annette Bunker, Ganesh Gopalakrishnan, Sally A. Mckee
2004 ACM Transactions on Design Automation of Electronic Systems  
The advent of the system-on-chip and intellectual property hardware design paradigms makes protocol compliance verification increasingly important to the success of a project.  ...  Finally, we make some general observations regarding the languages considered.  ...  These tools allow the user to animate the design, cross-check different charts for internal consistency, and automatically generate code.  ... 
doi:10.1145/966137.966138 fatcat:hffgv4stqnhlxohm4ojyuu3lfq

Proceedings of the Second Program Visualization Workshop, 2002

Mordechai Ben-Ari
2002 DAIMI Report Series  
The Program Visualization Workshops aim to bring together researchers who design and construct program visualizations and, above all, educators who use and evaluate visualizations in their teaching.  ...  Acknowledgments We would like to thank all the students who took part in the experimentation for their enthusiasm and their active participation.  ...  For example, students thought that I/O instructions are unique to the EasyCPU environment because they used them to control on-screen I/O simulation (Figure 1 ).  ... 
doi:10.7146/dpb.v31i567.7124 fatcat:xkgclvxh3rc6xaqb4xlppumu2u

Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks

Ignacio Martin, Sebastian Troia, Jose Alberto Hernandez, Alberto Rodriguez, Francesco Musumeci, Guido Maier, Rodolfo Alvizu, Oscar Gonzalez de Dios
2019 IEEE Transactions on Network and Service Management  
For the first stage, we developed the Netgen system for data generation and labeling at scale.  ...  Instead of analyzing static code, which can be easily hindered, dynamic analysis proposes to execute samples within a controlled environment to observe malicious actions at runtime.  ... 
doi:10.1109/tnsm.2019.2927867 fatcat:or3lhqdqbnas3cztwkqr5ykhhq

Holistic Runtime Scheduling for the Distributed Computing Landscape

Marcel Blöcher
Many application-level resource scheduling systems lack support for runtime scheduling, often due to slow or unsuitable algorithms.  ...  Without runtime scheduling, resource scheduling must run in advance for many scenarios and, at best, repeats periodically to update scheduling decisions.  ...  "ROME: All Overlays Lead to Aggregation, but Some Are Faster than Others". Submitted for publication.  ... 
doi:10.26083/tuprints-00018576 fatcat:yhndjijxcjb6bn2h45c6r4aqia

Fostering Program Comprehension in Novice Programmers - Learning Activities and Learning Trajectories

Cruz Izu, Carsten Schulte, Ashish Aggarwal, Quintin Cutts, Rodrigo Duran, Mirela Gutica, Birte Heinemann, Eileen Kraemer, Violetta Lonati, Claudio Mirolo, Renske Weeda
2019 Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education  
structure leads to imperfect comprehension, as existing schemata fail to apply.  ...  These LTs provide a path for particular aspects for programming and com- prehension, but to the best of our knowledge, there is no learning trajectory for ProgComp as an integrative skill.  ... 
doi:10.1145/3344429.3372501 dblp:conf/iticse/IzuSACDGHKLMW19a fatcat:ylcbps6pynbrfhlxtt6z3qmlza

Abstracts from the 52nd European Society of Human Genetics (ESHG) Conference: Oral Presentations

2019 European Journal of Human Genetics  
In general, we understood that certain views are common among experts, such as the extreme caution which should guide the path from the lab to clinical trials.  ...  AKAP4 has been described to be required for structural and functional integrity of the fibrous sheath. We generated Akap4knockout mice line using CRISPR-Cas9 system.  ...  of GT by GC did not lead to the generation of normal transcripts.  ... 
doi:10.1038/s41431-019-0492-4 fatcat:wuudroxpgfe6vfpv2ddzyr7vhi
« Previous Showing results 1 — 15 out of 51 results