Sökning: "Compiler security"
Visar resultat 1 - 5 av 10 uppsatser innehållade orden Compiler security.
1. Functional Programming Languages and the JVM : Comparing Functional Language Compilation Techniques for the JVM
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Because of its security, high availability, and automatic memory management, the JVM (Java Virtual Machine) is a desirable execution environment. However, since the JVM was originally made for Java, which is an objectoriented language, it is hard for languages with other paradigms to run on it. LÄS MER
2. Kodanonymisering vid integration med ChatGPT : Säkrare ChatGPT-användning med en kodanonymiseringsapplikation
Kandidat-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Sammanfattning : Denna avhandling studerar området av kodanonymisering inom programvaruutveckling, med fokus på att skydda känslig källkod i en alltmer digitaliserad och AI-integrerad värld. Huvudproblemen som avhandlingen adresserar är de tekniska och säkerhetsmässiga utmaningarna som uppstår när källkod behöver skyddas, samtidigt som den ska vara tillgänglig för AI-baserade analysverktyg som ChatGPT. LÄS MER
3. Diverse Double-Compiling to Harden Cryptocurrency Software
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. LÄS MER
4. ROP-chain generation using Genetic Programming : GENROP
Master-uppsats, Linköpings universitet/Institutionen för datavetenskapSammanfattning : Return Oriented Programming (ROP) is the de-facto technique used to exploit most of today’s native-code vulnerabilities hiding in old and newly developed software alike. By reusing bits and pieces of already existing code (gadgets), ROP can be used to bypass the ever-present Write ⊕ eXecute (W⊕X) security feature, which enforces memory to only be marked as either executable or writable; never both at the same time. LÄS MER
5. Pattern Matching for Non-inductive Types in Code-generating Haskell EDSLs
Master-uppsats, Göteborgs universitet/Institutionen för data- och informationsteknikSammanfattning : Internet of Things (IoT) devices are becoming increasingly common in the modern home, as are IoT-related security vulnerabilities. There are reasons to believe that many of these vulnerabilities were caused by programming errors made possible due to working in a low-level programming language. LÄS MER