287,534 Hits in 2.3 sec

Reusing reused code

Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto
2013 2013 20th Working Conference on Reverse Engineering (WCRE)  
In the proposed technique, code are suggested at the unit of past reuse. The proposed technique detects reused code by using a fine-grained code clone detection technique.  ...  Although source code search systems are well known as being helpful to reuse source code, they have an issue that they often suggest larger code than what users actually need.  ...  One reason why code clones occur in source code is code reuse so that detecting code clones means detecting past code reuse.  ... 
doi:10.1109/wcre.2013.6671322 dblp:conf/wcre/IshiharaHHK13 fatcat:jnfuf6ty3vczdij7rbgh4jtjde

Toward Reusing Code Changes

Yoshiki Higo, Akio Ohtani, Shinpei Hayashi, Hideaki Hata, Kusumoto Shinji
2015 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories  
Existing techniques have succeeded to help developers implement new code. However, they are insufficient to help to change existing code.  ...  Unlike existing techniques, our system can support any kinds of code changes if similar code changes occurred in the past.  ...  SYSTEM FOR REUSING CODE CHANGES Change Pattern Database: including information of past code changes. In order to reuse them easily, they are stored into the database as patterns.  ... 
doi:10.1109/msr.2015.43 dblp:conf/msr/HigoOHHK15 fatcat:43dcjlhfdjeqdbqvcp5o4hhkyu

Code Reuse With Transformation Objects [article]

Dmitri Boulytchev
2018 arXiv   pre-print
We present an approach for a lightweight datatype-generic programming in Objective Caml programming language aimed at better code reuse.  ...  This property is important for code reuse.  ...  Since the modification is quite modest, we might expect a significant code reuse.  ... 
arXiv:1802.01930v1 fatcat:lu4l3bb6jzbvnh3qm3d2gjt2se

Code Reuse Attacks in PHP

Johannes Dahse, Nikolai Krein, Thorsten Holz
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Surprisingly, code reuse attacks are also a viable attack vector against web applications. In this paper, we study code reuse attacks in the context of PHP-based web applications.  ...  Over the last few years, especially code reuse attacks attracted a lot of attention.  ...  Code Reuse Techniques The idea of reusing existing code instead of injecting shellcode goes back to Solar Designer, who was the first to publicly documented such an attack to bypass a non-executable stack  ... 
doi:10.1145/2660267.2660363 dblp:conf/ccs/DahseKH14 fatcat:j6gz5nzg2fbhpa6hkagxmgvhie

Malleable Coding with Fixed Reuse [article]

Lav R. Varshney, Julius Kusuma, Vivek K Goyal
2011 arXiv   pre-print
A malleable coding scheme considers both compression efficiency and ease of alteration, promoting codeword reuse.  ...  We examine the trade-off between compression efficiency and malleability cost-the difficulty of synchronizing compressed versions-measured as the length of a reused prefix portion.  ...  reused segment of the source code for the malleable coding problem.  ... 
arXiv:0809.0737v2 fatcat:kxrx2baihrcg5nuhtdw47c7dsq

Reusing Code in Genetic Programming [chapter]

Edgar Galván López, Riccardo Poli, Carlos A. Coello Coello
2004 Lecture Notes in Computer Science  
In this paper we propose an approach to Genetic Programming based on code reuse and we test it in the design of combinational logic circuits at the gate-level.  ...  The reuse of code is a very important characteristic in human programming. So, several attempts have been made to introduce the ability to reuse code in GP.  ...  Code reuse is also possible with Parallel Distributed Genetic Programming (PDGP) [14, 15, 16] .  ... 
doi:10.1007/978-3-540-24650-3_34 fatcat:72kahmrifrdynkkocguqtimafm

Code Reuse between Java and Android Applications

Yoonsik Cheon, Carlos Chavez, Ubaldo Castro
2019 Proceedings of the 14th International Conference on Software Technologies  
Our key finding is that 37%-40% of code can be shared and reused between the Java and the Android versions of our application.  ...  In this paper, we perform a case study to measure quantitatively the amount of code that can be shared and reused for a multiplatform application running on the Java platform and the Android platform.  ...  The class diagram also shows how we maximize code reuse and minimize code duplication.  ... 
doi:10.5220/0007843702460253 dblp:conf/icsoft/CheonCC19 fatcat:4nedwtqk4rd53mutqgunpryyvm

Seamless Code Reuse with Source Code Corpus

Tetsuo Yamamoto, Norihiro Yoshida, Yoshiki Higo
2013 2013 20th Asia-Pacific Software Engineering Conference (APSEC)  
However, code reuse itself requires human resources: for example, searching and opening source files including code fragments that users would like to reuse, or considering keywords in using code search  ...  Code reuse is attracting much attention as a promising technique for efficient software development.  ...  However, code reuse itself requires costs, which is more expensive than finding reused code. For example, we need to search code fragments to be available for code reuse.  ... 
doi:10.1109/apsec.2013.108 dblp:conf/apsec/YamamotoYH13 fatcat:id2tbbw6mnewbopkceyghv4k3q

Code-Reuse Attacks for the Web

Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß, Eduardo A. Vela Nava, Martin Johns
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
reuse attacks.  ...  Thus, script gadgets introduce the practice of code-reuse attacks [27] , comparable to return-to-libc, to the Web.  ... 
doi:10.1145/3133956.3134091 dblp:conf/ccs/LekiesKGNJ17 fatcat:kaeubika4rfrpkmkvkym7l2aii

Malleable coding with fixed segment reuse

Julius Kusuma, Lav R. Varshney, Vivek K Goyal
2011 2011 IEEE International Symposium on Information Theory Proceedings  
A malleable coding scheme considers both compression efficiency and ease of alteration, promoting codeword reuse.  ...  We examine the trade-off between compression efficiency and malleability cost-the difficulty of synchronizing compressed versions-measured as the length of a reused prefix portion.  ...  Proposition 1: Taking K > H(X) provides no advantage in malleable coding with fixed reuse.  ... 
doi:10.1109/isit.2011.6034192 dblp:conf/isit/KusumaVG11 fatcat:tjvr4brogndktg62jihiwzkcmu

What is Type-Safe Code Reuse?

Jens Palsberg, Michael I. Schwartzbach
1990 DAIMI Report Series  
In short, it captures type-safe code reuse.</p>  ...  <p>Subclassing is reuse of class definitions. It is usually tied to the use of class names, thus relying on the order in which the particular classes in a program are created.  ...  Such mechanisms allow type-safe code reuse.  ... 
doi:10.7146/dpb.v19i342.6572 fatcat:axq5cwgv2jcxxouftawbkqex7y

About Detection of Code Reuse Attacks

Yury V. Kosolapov
2019 Modelirovanie i Analiz Informacionnyh Sistem  
Keywords: code reuse, software vulnerability On the authors: Yury V.  ...  The article proposes a way to protect applications from attacks that use code reuse.  ... 
doi:10.18255/1818-1015-2019-2-213-228 fatcat:hsxsxzurtbgohgrwhfa2vga3ly

Code Reuse in Open Source Software

Stefan Haefliger, Georg von Krogh, Sebastian Spaeth
2008 Management science  
the quality of software components, and they have incentives to reuse code.  ...  and skills, and because they can mitigate development costs through code reuse.  ...  Knowledge and code reuse There were three broad forms of knowledge and code reuse in the core sample: algorithms and methods, single lines of code, and components.  ... 
doi:10.1287/mnsc.1070.0748 fatcat:wd3u3ejrcjemda4tgl3b2otmii

NCQ: Code reuse support for node.js developers [article]

Brittany Reid, Marcelo d`Amorim, Markus Wagner, Christoph Treude
2022 arXiv   pre-print
Code reuse is an important part of software development. The adoption of code reuse practices is especially common among Node.js developers.  ...  Our results suggest that NCQ makes Node.js developers more efficient in reusing code.  ...  Empirical Studies on Code Reuse Various studies have been conducted to understand developers' perceptions on the advantages and disadvantages of code reuse [14] - [19] .  ... 
arXiv:2101.00756v2 fatcat:fkc5ggox6vga5ctdjt2riufzbm

Survey of Methods for Automated Code-Reuse Exploit Generation [article]

Alexey Vishnyakov, Alexey Nurmukhametov
2020 arXiv   pre-print
This paper provides a survey of methods and tools for automated code-reuse exploit generation. Such exploits use code that is already contained in a vulnerable program.  ...  The code-reuse approach allows one to exploit vulnerabilities in the presence of operating system protection that prohibits data memory execution.  ...  Code-Reuse Attacks Code-reuse attacks have appeared to bypass the protection that prevents data execution.  ... 
arXiv:2011.07862v1 fatcat:dzidwisozrdtdiokmgsc3dxuyi
« Previous Showing results 1 — 15 out of 287,534 results