- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
0002000000000000
- More
- Availability
-
20
- Author / Contributor
- Filter by Author / Creator
-
-
Debray, Saumya (2)
-
Stephens, Jon (2)
-
Ashley, Paul (1)
-
Bartels, Jesse (1)
-
Baudry, Benoit (1)
-
Brunton, Finn (1)
-
Cirio, Paolo (1)
-
Cote, Nicole (1)
-
Echizen, Isao (1)
-
Friedler, Sorelle (1)
-
Grosser, Ben (1)
-
Gürses, Seda (1)
-
Hammond, Rob (1)
-
Harrand, Nicholas (1)
-
Harvey, Adam (1)
-
Houmansadr, Amir (1)
-
Howe, Daniel (1)
-
Möser, Malte (1)
-
Narayanan, Arvind (1)
-
Nissenbaum, Helen (1)
-
- Filter by Editor
-
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
null (Ed.)Dynamic code, i.e., code that is created or modified at runtime, is ubiquitous in today’s world. The behavior of dynamic code can depend on the logic of the dynamic code generator in subtle and non-obvious ways, e.g., JIT compiler bugs can lead to exploitable vulnerabilities in the resulting JIT-compiled code. Existing approaches to program analysis do not provide adequate support for reasoning about such behavioral relationships. This paper takes a first step in addressing this problem by describing a program representation and a new notion of dependency that allows us to reason about dependency and information flow relationships between the dynamic code generator and the generated dynamic code. Experimental results show that analyses based on these concepts are able to capture properties of dynamic code that cannot be identified using traditional program analyses.more » « less
-
Brunton, Finn; Nissenbaum, Helen; Echizen, Isao; Houmansadr, Amir; Cote, Nicole; Hammond, Rob; Friedler, Sorelle; Pawlick, Jeffrey; Zhu, Quanyan; Ashley, Paul; et al (, Obfuscation Workshop 2017)Papers summarizing contributions to the 2017 Obfuscation Workshop, and findings, discussions, and outcomes from the workshop.more » « less
An official website of the United States government

Full Text Available