咨询与建议

限定检索结果

文献类型

  • 19 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 29 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 工学
    • 20 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 7 篇 电气工程
    • 3 篇 信息与通信工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
  • 3 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 29 篇 self-modifying c...
  • 3 篇 performance
  • 3 篇 program analysis
  • 3 篇 verification
  • 3 篇 dynamic code
  • 3 篇 code obfuscation
  • 2 篇 languages
  • 2 篇 debugging
  • 2 篇 chip multiproces...
  • 2 篇 modular verifica...
  • 2 篇 assembly code ve...
  • 2 篇 power
  • 2 篇 design
  • 2 篇 obfuscation
  • 2 篇 synthesis
  • 2 篇 mesi protocol
  • 2 篇 program represen...
  • 2 篇 gene regulatory ...
  • 2 篇 internal and ext...
  • 2 篇 satisfiability m...

机构

  • 2 篇 tsinghua univ de...
  • 2 篇 georgia inst tec...
  • 2 篇 univ arizona dep...
  • 2 篇 yale univ dept c...
  • 2 篇 intel corp fdc a...
  • 2 篇 microsoft res ca...
  • 1 篇 university of te...
  • 1 篇 nanyang technol ...
  • 1 篇 univ wisconsin d...
  • 1 篇 univ michigan ad...
  • 1 篇 fac sci rabat la...
  • 1 篇 trasmeta corp sa...
  • 1 篇 harbin inst tech...
  • 1 篇 agence natl secu...
  • 1 篇 bar ilan univ il...
  • 1 篇 univ texas dalla...
  • 1 篇 nancy univ loria...
  • 1 篇 univ cambridge c...
  • 1 篇 katholieke univ ...
  • 1 篇 intel labs hills...

作者

  • 2 篇 ballapuram chinn...
  • 2 篇 wintersteiger ch...
  • 2 篇 dunn sara-jane
  • 2 篇 debray saumya
  • 2 篇 shao zhong
  • 2 篇 sharif ahmad
  • 2 篇 cai hongxu
  • 2 篇 lee hsien-hsin s...
  • 2 篇 kugler hillel
  • 2 篇 vaynberg alexand...
  • 2 篇 hamadi youssef
  • 2 篇 shavit yoli
  • 2 篇 yordanov boyan
  • 1 篇 zhang mingwei
  • 1 篇 klaiber a
  • 1 篇 silberman gm
  • 1 篇 kistler t
  • 1 篇 jon stephens
  • 1 篇 johnson r
  • 1 篇 liang zhihong

语言

  • 27 篇 英文
  • 2 篇 其他
检索条件"主题词=self-modifying code"
29 条 记 录,以下是1-10 订阅
排序:
A taxonomy of self-modifying code for obfuscation
收藏 引用
COMPUTERS & SECURITY 2011年 第8期30卷 679-691页
作者: Mavrogiannopoulos, Nikos Kisserli, Nessim Preneel, Bart Katholieke Univ Leuven ESAT SCD COSIC IBBT B-3001 Louvain Belgium
self-modifying code is frequently used as an additional layer of complexity when obfuscating code. Although it does not provide a provable level of obfuscation, it is generally assumed to make attacks more expensive. ... 详细信息
来源: 评论
A Survey of Software Protection Methods based on self-modifying code  7
A Survey of Software Protection Methods based on Self-modify...
收藏 引用
7th International Conference on Computational Intelligence and Communication Networks (CICN)
作者: Mi Xianya Zhang Yi Wang Baosheng Tang Yong Natl Univ Def & Technol Coll Comp Changsha Hunan Peoples R China
As the software industry develops rapidly, protecting software intellectual property from reverse attacker has become more and more important. The technical way is to make software hard to understand and will cost att... 详细信息
来源: 评论
Certified self-modifying code  07
Certified self-modifying code
收藏 引用
Conference on Programming Language Design and Implementation
作者: Cai, Hongxu Shao, Zhong Vaynberg, Alexander Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China Yale Univ Dept Comp Sci New Haven CT 06520 USA
self-modifying code (SMC), in this paper, broadly refers to any program that loads, generates, or mutates code at runtime. It is widely used in many of the world's critical software systems to support runtime code... 详细信息
来源: 评论
Certified self-modifying code
收藏 引用
ACM SIGPLAN NOTICES 2007年 第6期42卷 66-77页
作者: Cai, Hongxu Shao, Zhong Vaynberg, Alexander Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China Yale Univ Dept Comp Sci New Haven CT 06520 USA
self-modifying code (SMC), in this paper, broadly refers to any program that loads, generates, or mutates code at runtime. It is widely used in many of the world's critical software systems to support runtime code... 详细信息
来源: 评论
Pure Infinitely self-modifying code is Realizable and Turing-complete
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS 2018年 第2期64卷 123-129页
作者: Morse, Gregory Eotvos Lorand Univ Budapest Hungary
Although self-modifying code has been shyed away from due to its complexity and discouragement due to safety issues, it nevertheless provides for a very unique obfuscation method and a different perspective on the rel... 详细信息
来源: 评论
The Executioner Paradox: understanding self-referential dilemma in computational systems
收藏 引用
AI & SOCIETY 2025年 第3期40卷 1939-1946页
作者: Mahajan, Sachit Swiss Fed Inst Technol Computat Social Sci Clausiusstr 50 CH-8092 Zurich Switzerland
As computational systems burgeon with advancing artificial intelligence (AI), the deterministic frameworks underlying them face novel challenges, especially when interfacing with self-modifying code. The Executioner P... 详细信息
来源: 评论
Lazy Cache Invalidation for self-modifying codes
Lazy Cache Invalidation for Self-Modifying Codes
收藏 引用
ACM International Conference on Compilers, Architectures and Synthesis for Embedded Systems (CASES)
作者: Gutierrez, Anthony Pusdesris, Joseph Dreslinski, Ronald G. Mudge, Trevor Univ Michigan Adv Comp Architecture Lab Ann Arbor MI 48109 USA
Just-in-time compilation with dynamic code optimization is often used to help improve the performance of applications that utilize high-level languages and virtual run-time environments, such as those found in smartph... 详细信息
来源: 评论
SGXELIDE: Enabling Enclave code Secrecy via self-Modification  2018
SGXELIDE: Enabling Enclave Code Secrecy via Self-Modificatio...
收藏 引用
16th International Symposium on code Generation and Optimization (CGO)
作者: Bauman, Erick Wang, Huibo Zhang, Mingwei Lin, Zhiqiang Univ Texas Dallas Richardson TX 75083 USA Intel Labs Hillsboro OR USA
Intel SGX provides a secure enclave in which code and data are hidden from the outside world, including privileged code such as the OS or hypervisor. However, by default, enclave code prior to initialization can be di... 详细信息
来源: 评论
Local and global models of physics and computation
收藏 引用
INTERNATIONAL JOURNAL OF GENERAL SYSTEMS 2014年 第7期43卷 673-681页
作者: Stepney, Susan Univ York Dept Comp Sci York YO10 5DD N Yorkshire England
Classical computation is essentially local in time, yet some formulations of physics are global in time. Here, I examine these differences and suggest that certain forms of unconventional computation are needed to mod... 详细信息
来源: 评论
Automated Synthesis and Analysis of Switching Gene Regulatory Networks
收藏 引用
BIOSYSTEMS 2016年 第0期146卷 26-34页
作者: Shavit, Yoli Yordanov, Boyan Dunn, Sara-Jane Wintersteiger, Christoph M. Otani, Tomoki Hamadi, Youssef Livesey, Frederick J. Kugler, Hillel Univ Cambridge Cambridge CB2 1TN England Microsoft Res Cambridge England Bar Ilan Univ IL-52100 Ramat Gan Israel
Studying the gene regulatory networks (GRNs) that govern how cells change into specific cell types with unique roles throughout development is an active area of experimental research. The fate specification process ca... 详细信息
来源: 评论