期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
PtrProxy:Efficient Code Re-Randomization on AArch64 Platform
1
作者 Luo Chenke Fu Jianming +2 位作者 Ming Jiang Xie Mengfei Peng Guojun 《China Communications》 2025年第6期64-82,共19页
Memory-unsafe programming languages,such as C/C++,are often used to develop system programs,rendering the programs susceptible to a variety of memory corruption attacks.Among these threats,just-in-time return-oriented... Memory-unsafe programming languages,such as C/C++,are often used to develop system programs,rendering the programs susceptible to a variety of memory corruption attacks.Among these threats,just-in-time return-oriented programming(JIT-ROP)stands out as an advanced method for conducting code-reuse attacks,effectively circumventing code randomization safeguards.JIT-ROP leverages memory disclosure vulnerabilities to obtain reusable code fragments dynamically and assemble malicious payloads dynamically.In response to JIT-ROP attacks,several re-randomization implementations have been developed to prevent the use of disclosed code.However,existing re-randomization methods require recurrent re-randomization during program runtime according to fixed time windows or specific events such as system calls,incurring significant runtime overhead.In this paper,we present the design and implementation of PtrProxy,an efficient re-randomization approach on the AArch64 platform.Unlike previous methods that necessitate frequent runtime rerandomization or reply on unreliable triggering conditions,this approach triggers the re-randomization process by detecting the code page harvest operation,which is a fundamental operation of the JIT-ROP at-tacks,making our method more efficient and reliable than previous approaches.We evaluate PtrProxy on benchmarks and real-world applications.The evaluation results show that our approach can effectively protect programs from JIT-ROP attacks while introducing marginal runtime overhead. 展开更多
关键词 code reuse attacks re-randomization return-oriented programming security and privacy software security
在线阅读 下载PDF
Code Component Composition Reuse Is a New Programming Paradigm 被引量:1
2
作者 Ying Shi 1,Yuan Sheng Qiong 1,Xu Gang 1,He Ke Qing 2 1.State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China 2.School of Computer Science and Technology, Wuhan University, Wuhan 430072, China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期292-297,共6页
After describing the characteristics of programming paradigm, this paper introduces the approach of code component composition reuse in detail, proposes and discusses viewpoint that code component composition reuse is... After describing the characteristics of programming paradigm, this paper introduces the approach of code component composition reuse in detail, proposes and discusses viewpoint that code component composition reuse is a kind of new programming paradigm. This paper also specifies the characteristics of this new programming paradigm in detail, and points out some issues that must be resolved for using this new programming paradigm. 展开更多
关键词 programming paradigm code component code component composition reuse
在线阅读 下载PDF
Fast code recommendation via approximate sub-tree matching 被引量:1
3
作者 Yichao SHAO Zhiqiu HUANG +1 位作者 Weiwei LI Yaoshen YU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第8期1205-1216,共12页
Software developers often write code that has similar functionality to existing code segments.A code recommendation tool that helps developers reuse these code fragments can significantly improve their efficiency.Seve... Software developers often write code that has similar functionality to existing code segments.A code recommendation tool that helps developers reuse these code fragments can significantly improve their efficiency.Several methods have been proposed in recent years.Some use sequence matching algorithms to find the related recommendations.Most of these methods are time-consuming and can leverage only low-level textual information from code.Others extract features from code and obtain similarity using numerical feature vectors.However,the similarity of feature vectors is often not equivalent to the original code’s similarity.Structural information is lost during the process of transforming abstract syntax trees into vectors.We propose an approximate sub-tree matching based method to solve this problem.Unlike existing tree-based approaches that match feature vectors,it retains the tree structure of the query code in the matching process to find code fragments that best match the current query.It uses a fast approximation sub-tree matching algorithm by transforming the sub-tree matching problem into the match between the tree and the list.In this way,the structural information can be used for code recommendation tasks that have high time requirements.We have constructed several real-world code databases covering different languages and granularities to evaluate the effectiveness of our method.The results show that our method outperforms two compared methods,SENSORY and Aroma,in terms of the recall value on all the datasets,and can be applied to large datasets. 展开更多
关键词 code reuse code recommendation Tree similarity Structure information
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部