compiled code
Recently Published Documents


TOTAL DOCUMENTS

56
(FIVE YEARS 4)

H-INDEX

5
(FIVE YEARS 1)

Queue ◽  
2021 ◽  
Vol 19 (1) ◽  
pp. 16-19
Author(s):  
George V. Neville-Neil
Keyword(s):  

One should never hardcode a version or a path inside the code itself. Code needs to be flexible so that it can be installed anywhere and run anywhere so long as the necessary dependencies can be resolved, either at build time for statically compiled code or at runtime for interpreted code or code with dynamically linked libraries. There are current, good ways to get this right, so it?s a shame that so many people continue to get it wrong.


2021 ◽  
Vol 43 (1) ◽  
pp. 1-41
Author(s):  
Marco Patrignani ◽  
Deepak Garg

Security-preserving compilers generate compiled code that withstands target-level attacks such as alteration of control flow, data leaks, or memory corruption. Many existing security-preserving compilers are proven to be fully abstract, meaning that they reflect and preserve observational equivalence. Fully abstract compilation is strong and useful but, in certain cases, comes at the cost of requiring expensive runtime constructs in compiled code. These constructs may have no relevance for security, but are needed to accommodate differences between the source and target languages that fully abstract compilation necessarily needs. As an alternative to fully abstract compilation, this article explores a different criterion for secure compilation called robustly safe compilation or RSC . Briefly, this criterion means that the compiled code preserves relevant safety properties of the source program against all adversarial contexts interacting with the compiled program. We show that RSC can be proved more easily than fully abstract compilation and also often results in more efficient code. We also present two different proof techniques for establishing that a compiler attains RSC and, to illustrate them, develop three illustrative robustly safe compilers that rely on different target-level protection mechanisms. We then proceed to turn one of our compilers into a fully abstract one and through this example argue that proving RSC can be simpler than proving full abstraction. To better explain and clarify notions, this article uses syntax highlighting in a way that colourblind and black-8-white readers can benefit from Reference [58]. For a better experience, please print or view this article in colour . 1


Author(s):  
Igor Andrianov ◽  
Svetlana Rzheutskaya ◽  
Alexey Sukonschikov ◽  
Dmitry Kochkin ◽  
Anatoly Shvetsov ◽  
...  

Computers ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 24 ◽  
Author(s):  
Henning Schnoor ◽  
Wilhelm Hasselbring

Coupling metrics that count the number of inter-module connections in a software system are an established way to measure internal software quality with respect to modularity. In addition to static metrics, which are obtained from the source or compiled code of a program, dynamic metrics use runtime data gathered, e.g., by monitoring a system in production. Dynamic metrics have been used to improve the accuracy of static metrics for object-oriented software. We study weighted dynamic coupling that takes into account how often a connection (e.g., a method call) is executed during a system’s run. We investigate the correlation between dynamic weighted metrics and their static counterparts. To compare the different metrics, we use data collected from four different experiments, each monitoring production use of a commercial software system over a period of four weeks. We observe an unexpected level of correlation between the static and the weighted dynamic case as well as revealing differences between class- and package-level analyses.


2018 ◽  
Vol 48 (5) ◽  
pp. 1042-1055
Author(s):  
Suchakrapani Datt Sharma ◽  
Michel R. Dagenais
Keyword(s):  

2017 ◽  
Vol 104 ◽  
pp. 109-119 ◽  
Author(s):  
Florian Gerber ◽  
Kaspar Mösinger ◽  
Reinhard Furrer
Keyword(s):  

Author(s):  
Bogdan-Andrei Tabacaru ◽  
Moomen Chaari ◽  
Wolfgang Ecker ◽  
Thomas Kruse ◽  
Cristiano Novello

2013 ◽  
Vol 760-762 ◽  
pp. 531-535
Author(s):  
Jun Hua Shao ◽  
Zhan Jun Jiang

Source encoding algorithm has been widely concerned by the researchers, which aims to improve communication efficiency. In this paper, we put forward a new source encoding algorithm to decrease the redundancies between compiled code words in Shannon encoding. With the proposed algorithm, a code word is selected by considering whether the code is the prefix code of the other code words or not. The performance of the new encoding algorithm is investigated for both equal probability of source symbols and non-equal probability condition. Numerical results show that the proposed encoding algorithm can improve the encoding efficiency obviously, especially for the case of great probability differences between source symbols.


Sign in / Sign up

Export Citation Format

Share Document