咨询与建议

限定检索结果

文献类型

  • 20 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 30 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 21 篇 计算机科学与技术...
    • 15 篇 软件工程
    • 7 篇 电气工程
    • 3 篇 信息与通信工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
  • 3 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 30 篇 self-modifying c...
  • 3 篇 performance
  • 3 篇 program analysis
  • 3 篇 verification
  • 3 篇 dynamic code
  • 3 篇 code obfuscation
  • 2 篇 languages
  • 2 篇 debugging
  • 2 篇 chip multiproces...
  • 2 篇 modular verifica...
  • 2 篇 assembly code ve...
  • 2 篇 power
  • 2 篇 design
  • 2 篇 obfuscation
  • 2 篇 synthesis
  • 2 篇 mesi protocol
  • 2 篇 program represen...
  • 2 篇 gene regulatory ...
  • 2 篇 internal and ext...
  • 2 篇 satisfiability m...

机构

  • 2 篇 tsinghua univ de...
  • 2 篇 georgia inst tec...
  • 2 篇 univ arizona dep...
  • 2 篇 yale univ dept c...
  • 2 篇 intel corp fdc a...
  • 2 篇 microsoft res ca...
  • 1 篇 university of te...
  • 1 篇 nanyang technol ...
  • 1 篇 univ wisconsin d...
  • 1 篇 univ michigan ad...
  • 1 篇 fac sci rabat la...
  • 1 篇 trasmeta corp sa...
  • 1 篇 harbin inst tech...
  • 1 篇 agence natl secu...
  • 1 篇 google sunnyvale...
  • 1 篇 bar ilan univ il...
  • 1 篇 univ texas dalla...
  • 1 篇 nancy univ loria...
  • 1 篇 univ cambridge c...
  • 1 篇 katholieke univ ...

作者

  • 2 篇 ballapuram chinn...
  • 2 篇 wintersteiger ch...
  • 2 篇 dunn sara-jane
  • 2 篇 debray saumya
  • 2 篇 shao zhong
  • 2 篇 sharif ahmad
  • 2 篇 cai hongxu
  • 2 篇 lee hsien-hsin s...
  • 2 篇 kugler hillel
  • 2 篇 vaynberg alexand...
  • 2 篇 hamadi youssef
  • 2 篇 shavit yoli
  • 2 篇 yordanov boyan
  • 1 篇 zhang mingwei
  • 1 篇 klaiber a
  • 1 篇 silberman gm
  • 1 篇 kistler t
  • 1 篇 jon stephens
  • 1 篇 johnson r
  • 1 篇 liang zhihong

语言

  • 28 篇 英文
  • 2 篇 其他
检索条件"主题词=self-modifying code"
30 条 记 录,以下是1-10 订阅
排序:
SMaCk: Efficient Instruction Cache Attacks via self-modifying code Conflicts  25
SMaCk: Efficient Instruction Cache Attacks via Self-Modifyin...
收藏 引用
30th International Conference on Architectural Support for Programming Languages and Operating Systems-ASPLOS
作者: Son, Seonghun Moghimi, Daniel Gulmezoglu, Berk Iowa State Univ Ames IA 50011 USA Google Sunnyvale CA USA
self-modifying code (SMC) allows programs to alter their own instructions, optimizing performance and functionality on x86 processors. Despite its benefits, SMC introduces unique microarchitectural behaviors that can ... 详细信息
来源: 评论
Pure Infinitely self-modifying code is Realizable and Turing-complete
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS 2018年 第2期64卷 123-129页
作者: Morse, Gregory Eotvos Lorand Univ Budapest Hungary
Although self-modifying code has been shyed away from due to its complexity and discouragement due to safety issues, it nevertheless provides for a very unique obfuscation method and a different perspective on the rel... 详细信息
来源: 评论
A Survey of Software Protection Methods based on self-modifying code  7
A Survey of Software Protection Methods based on Self-modify...
收藏 引用
7th International Conference on Computational Intelligence and Communication Networks (CICN)
作者: Mi Xianya Zhang Yi Wang Baosheng Tang Yong Natl Univ Def & Technol Coll Comp Changsha Hunan Peoples R China
As the software industry develops rapidly, protecting software intellectual property from reverse attacker has become more and more important. The technical way is to make software hard to understand and will cost att... 详细信息
来源: 评论
The Executioner Paradox: understanding self-referential dilemma in computational systems
收藏 引用
AI & SOCIETY 2025年 第3期40卷 1939-1946页
作者: Mahajan, Sachit Swiss Fed Inst Technol Computat Social Sci Clausiusstr 50 CH-8092 Zurich Switzerland
As computational systems burgeon with advancing artificial intelligence (AI), the deterministic frameworks underlying them face novel challenges, especially when interfacing with self-modifying code. The Executioner P... 详细信息
来源: 评论
Lightweight fuzzy testing method based on stake points of power control system  5
Lightweight fuzzy testing method based on stake points of po...
收藏 引用
5th International Conference on Computer Engineering and Application (ICCEA)
作者: Yang, Yiwei Yan, Binyuan Hong, Chao Wei, Lipeng Liang, Zhihong Fu, Yun Chen, Lin Tao, Jiaye China Southern Power Grid Guangdong Prov Key Lab Power Syst Network Secur Elect Power Res Inst Guangzhou Peoples R China Guizhou Power Grid Co Informat Ctr Guiyang Peoples R China
Cyber threats are extremely frequent, and fuzz testing is an effective method to discover vulnerabilities. Regarding the optimization of fuzz testing cost, firstly, the cost distribution of each module during the fuzz... 详细信息
来源: 评论
Automated Bug Localization in JIT Compilers  2021
Automated Bug Localization in JIT Compilers
收藏 引用
17th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE)
作者: Lim, HeuiChan Debray, Saumya Univ Arizona Dept Comp Sci Tucson AZ 85721 USA
Many widely-deployed modern programming systems use just-in-time (JIT) compilers to improve performance. The size and complexity of JIT-based systems, combined with the dynamic nature of JIT-compiler optimizations, ma... 详细信息
来源: 评论
Representing and Reasoning about Dynamic code  35
Representing and Reasoning about Dynamic Code
收藏 引用
35th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Bartels, Jesse Stephens, Jon Debray, Saumya Univ Arizona Dept Comp Sci Tucson AZ 85721 USA Univ Texas Dept Comp Sci Austin TX 78712 USA
Dynamic code, i.e., code that is created or modified at runtime, is ubiquitous in today's world. The behavior of dynamic code can depend on the logic of the dynamic code generator in subtle and nonobvious ways, e.... 详细信息
来源: 评论
Representing and reasoning about dynamic code  20
Representing and reasoning about dynamic code
收藏 引用
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering
作者: Jesse Bartels Jon Stephens Saumya Debray The University Of Arizona University Of Texas
Dynamic code, i.e., code that is created or modified at runtime, is ubiquitous in today's world. The behavior of dynamic code can depend on the logic of the dynamic code generator in subtle and non-obvious ways, e... 详细信息
来源: 评论
SGXELIDE: Enabling Enclave code Secrecy via self-Modification  2018
SGXELIDE: Enabling Enclave Code Secrecy via Self-Modificatio...
收藏 引用
16th International Symposium on code Generation and Optimization (CGO)
作者: Bauman, Erick Wang, Huibo Zhang, Mingwei Lin, Zhiqiang Univ Texas Dallas Richardson TX 75083 USA Intel Labs Hillsboro OR USA
Intel SGX provides a secure enclave in which code and data are hidden from the outside world, including privileged code such as the OS or hypervisor. However, by default, enclave code prior to initialization can be di... 详细信息
来源: 评论
A taxonomy of self-modifying code for obfuscation
收藏 引用
COMPUTERS & SECURITY 2011年 第8期30卷 679-691页
作者: Mavrogiannopoulos, Nikos Kisserli, Nessim Preneel, Bart Katholieke Univ Leuven ESAT SCD COSIC IBBT B-3001 Louvain Belgium
self-modifying code is frequently used as an additional layer of complexity when obfuscating code. Although it does not provide a provable level of obfuscation, it is generally assumed to make attacks more expensive. ... 详细信息
来源: 评论