A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Software protection for dynamically-generated code
2013
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on - PPREW '13
We have implemented a PVM system that automatically inserts code into an application to dynamically generate polymorphic software knots. ...
Used in conjunction with established static techniques, our solution provides a mechanism for protecting PVM-generated code from modification. ...
In general, all software systems are vulnerable to such attacks, as such, we do not address this class of attacks in our work. ...
doi:10.1145/2430553.2430554
dblp:conf/popl/GhoshHD13
fatcat:pkmse5e6s5eqrcj5owlxizbf3y
Design Patterns for Sparse-Matrix Computations on Hybrid CPU/GPU Platforms
2014
Scientific Programming
We apply object-oriented software design patterns to develop code for scientific software involving sparse matrices. ...
kernels for sparse matrices. ...
We also thank the anonymous referees whose comment helped us to improve the presentation of this paper. ...
doi:10.1155/2014/469753
fatcat:jorjixkn3rf5zoulm6msvk6xlm
Multiparty Session Programming with Global Protocol Combinators
[article]
2020
arXiv
pre-print
Local behaviours for all processes in a protocol are inferred at once from a global combinator. ...
The state-of-the-art implementations of the MPST theory rely on (1) runtime linearity checks to ensure correct usage of communication channels and (2) external domain-specific languages for specifying ...
Acknowledgements We thank Jacques Garrigue and Oleg Kiselyov for their comments on an early version of this paper. ...
arXiv:2005.06333v2
fatcat:zqtsntdqjrgbnfmg262g6zattu
BinSlayer
2013
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop on - PPREW '13
of malware are frequently a simple evolution of existing code, whose differences stem only from a need to avoid detection. ...
As the volume of malware inexorably rises, comparison of binary code is of increasing importance to security analysts as a method of automatically classifying new malware samples; purportedly new examples ...
Acknowledgments We would like to thank Thomas Dullien for his fascinating seminar on BinDiff at Dagstuhl seminar 12051 [22] that inspired this study. ...
doi:10.1145/2430553.2430557
dblp:conf/popl/BourquinKR13
fatcat:qqwz5zz2h5f3vh6lithgdzakne
In this paper, we contribute: (4) a novel language-oriented approach to LOP for defining and using internal DSLs. ...
To validate our approach we present a case study in which Cedalion was used by biologists in designing a DNA microarray for molecular Biology research. ...
Just like Yacc files contain embedded C code, we wish to embed code in one DSL inside code in another DSL. ...
doi:10.1145/2048066.2048123
dblp:conf/oopsla/LorenzR11
fatcat:fe35lutmobc4zd2rxiiwzx2xji
Cedalion
2011
SIGPLAN notices
In this paper, we contribute: (4) a novel language-oriented approach to LOP for defining and using internal DSLs. ...
To validate our approach we present a case study in which Cedalion was used by biologists in designing a DNA microarray for molecular Biology research. ...
Just like Yacc files contain embedded C code, we wish to embed code in one DSL inside code in another DSL. ...
doi:10.1145/2076021.2048123
fatcat:tgkkjexvzvhbrcqfl3y3tjqwxe
The abstract state machines method for modular design and analysis of programming languages
2014
Journal of Logic and Computation
models, leading from the source code to a machine code view for full-fledged real-life programming languages. ...
concepts-ASM, ASM ground model and ASM refinement-characterize what became known as ASM method for the design and analysis of any software-based system [57] . ...
links design and analysis all the way from requirements capture to code development. ...
doi:10.1093/logcom/exu077
fatcat:7quppauog5eyvaahlbvlrk7w3u
Using Knowledge Graph Structures for Semantic Interoperability in Electronic Health Records Data Exchanges
2022
Information
The HL7 Clinical Document Architecture is on its way to adopting this through HL7 templates. Archetypes are the basis for knowledge-based systems as these are means to define clinical knowledge. ...
This study aims to discover knowledge representation to achieve semantic health data exchange. OpenEHR and CEN TC251 EN 13606 use archetype-based technology for semantic interoperability. ...
extract all the node paths of the mandatory fields, and then a form is generated. ...
doi:10.3390/info13020052
fatcat:see6kyiqlncyjgfzahucbbjqty
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses
[article]
2019
arXiv
pre-print
While the first generation of blockchain technology (i.e., Blockchain 1.0) is almost exclusively used for cryptocurrency purposes, the second generation (i.e., Blockchain 2.0), as represented by Ethereum ...
Since Ethereum is a new, yet complex, system, it is imperative to have a systematic and comprehensive understanding on its security from a holistic perspective, which is unavailable. ...
In order to facilitate code-reuse, EVM provides an opcode, DEL-EGATECALL, for embedding a callee contract's bytecode into the bytecode of the caller contract as if it's a piece of the latter's bytecode ...
arXiv:1908.04507v1
fatcat:wxddcfw57zginckgt7oucei2nu
Formal hardware specification languages for protocol compliance verification
2004
ACM Transactions on Design Automation of Electronic Systems
The advent of the system-on-chip and intellectual property hardware design paradigms makes protocol compliance verification increasingly important to the success of a project. ...
Finally, we make some general observations regarding the languages considered. ...
These tools allow the user to animate the design, cross-check different charts for internal consistency, and automatically generate code. ...
doi:10.1145/966137.966138
fatcat:hffgv4stqnhlxohm4ojyuu3lfq
Proceedings of the Second Program Visualization Workshop, 2002
2002
DAIMI Report Series
The Program Visualization Workshops aim to bring together researchers who design and construct program visualizations and, above all, educators who use and evaluate visualizations in their teaching. ...
Acknowledgments We would like to thank all the students who took part in the experimentation for their enthusiasm and their active participation. ...
For example, students thought that I/O instructions are unique to the EasyCPU environment because they used them to control on-screen I/O simulation (Figure 1 ). ...
doi:10.7146/dpb.v31i567.7124
fatcat:xkgclvxh3rc6xaqb4xlppumu2u
Machine Learning-Based Routing and Wavelength Assignment in Software-Defined Optical Networks
2019
IEEE Transactions on Network and Service Management
For the first stage, we developed the Netgen system for data generation and labeling at scale. ...
Instead of analyzing static code, which can be easily hindered, dynamic analysis proposes to execute samples within a controlled environment to observe malicious actions at runtime. ...
doi:10.1109/tnsm.2019.2927867
fatcat:or3lhqdqbnas3cztwkqr5ykhhq
Holistic Runtime Scheduling for the Distributed Computing Landscape
2021
Many application-level resource scheduling systems lack support for runtime scheduling, often due to slow or unsuitable algorithms. ...
Without runtime scheduling, resource scheduling must run in advance for many scenarios and, at best, repeats periodically to update scheduling decisions. ...
"ROME: All Overlays Lead to Aggregation, but Some Are Faster than Others". Submitted for publication. ...
doi:10.26083/tuprints-00018576
fatcat:yhndjijxcjb6bn2h45c6r4aqia
Fostering Program Comprehension in Novice Programmers - Learning Activities and Learning Trajectories
2019
Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education
structure leads to imperfect
comprehension, as existing schemata fail to apply. ...
These LTs provide a path for particular aspects for programming and com-
prehension, but to the best of our knowledge, there is no learning trajectory
for ProgComp as an integrative skill. ...
doi:10.1145/3344429.3372501
dblp:conf/iticse/IzuSACDGHKLMW19a
fatcat:ylcbps6pynbrfhlxtt6z3qmlza
Abstracts from the 52nd European Society of Human Genetics (ESHG) Conference: Oral Presentations
2019
European Journal of Human Genetics
In general, we understood that certain views are common among experts, such as the extreme caution which should guide the path from the lab to clinical trials. ...
AKAP4 has been described to be required for structural and functional integrity of the fibrous sheath. We generated Akap4knockout mice line using CRISPR-Cas9 system. ...
of GT by GC did not lead to the generation of normal transcripts. ...
doi:10.1038/s41431-019-0492-4
fatcat:wuudroxpgfe6vfpv2ddzyr7vhi
« Previous
Showing results 1 — 15 out of 51 results