Sciweavers

96 search results - page 9 / 20
» Exploiting and Protecting Dynamic Code Generation
Sort
View
157
Voted
ECOOP
1991
Springer
15 years 3 months ago
Optimizing Dynamically-Typed Object-Oriented Languages With Polymorphic Inline Caches
: Polymorphic inline caches (PICs) provide a new way to reduce the overhead of polymorphic message sends by extending inline caches to include more than one cached lookup result pe...
Urs Hölzle, Craig Chambers, David Ungar
SOSP
2007
ACM
15 years 9 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
EUROSYS
2007
ACM
15 years 9 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...
128
Voted
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 7 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ACSAC
2010
IEEE
14 years 10 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald