Sökning: "Binaries"
Visar resultat 1 - 5 av 77 uppsatser innehållade ordet Binaries.
1. Goddess, Lover, Mother, Witch : Feminist Revisionist Mythmaking and Feminine Morphology of Narrative in Madeline Miller’s Circe
Kandidat-uppsats, Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Sammanfattning : This thesis aims to position Circe by Madeline Miller as an example of feminist revisionist mythmaking and investigate some of the novel’s revisionary practices. I thus begin by introducing the project of feminist revisionism, as conceptualized by several different feminist thinkers. LÄS MER
2. Decompiling Go : Using metadata to improve decompilation readability
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Malware written in Go is on the rise, and yet, tools for investigating Go programs, such as decompilers, are limited. A decompiler takes a compiled binary and tries to recover its source code. Go is a high-level language that requires runtime metadata to implement many of its features, such as garbage collection and polymorphism. LÄS MER
3. Breaking WebAssembly Crypto Miner Detection by Obfuscation
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. LÄS MER
4. Intermediate-mass black hole binary as an origin of super-massive black holes
Kandidat-uppsats, Lunds universitet/Astrofysik; Lunds universitet/Fysiska institutionenSammanfattning : Galactic nuclei contain super-massive black holes (SMBHs), nuclear stellar clusters (NSCs), or both. In the NSC, intermediate-mass black holes (IMBHs) are likely to reside and form highly eccentric binaries. Over time, the orbit of a binary could harden via interaction with surrounding low-mass stars. LÄS MER
5. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
Kandidat-uppsats, Umeå universitet/Institutionen för datavetenskapSammanfattning : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. LÄS MER