Essays about: "Binaries"
Showing result 1 - 5 of 69 essays containing the word Binaries.
-
1. Goddess, Lover, Mother, Witch : Feminist Revisionist Mythmaking and Feminine Morphology of Narrative in Madeline Miller’s Circe
University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Abstract : This thesis aims to position Circe by Madeline Miller as an example of feminist revisionist mythmaking and investigate some of the novel’s revisionary practices. I thus begin by introducing the project of feminist revisionism, as conceptualized by several different feminist thinkers. READ MORE
-
2. Decompiling Go : Using metadata to improve decompilation readability
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Malware written in Go is on the rise, and yet, tools for investigating Go programs, such as decompilers, are limited. A decompiler takes a compiled binary and tries to recover its source code. Go is a high-level language that requires runtime metadata to implement many of its features, such as garbage collection and polymorphism. READ MORE
-
3. Breaking WebAssembly Crypto Miner Detection by Obfuscation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Blockchain-based cryptocurrencies is a fairly new concept with a worldwide spread, and there is a massive amount of currencies. Several of them involve so-called currency mining, a feature of Proof-of-Work based blockchains. READ MORE
-
4. Intermediate-mass black hole binary as an origin of super-massive black holes
University essay from Lunds universitet/Astrofysik; Lunds universitet/Fysiska institutionenAbstract : Galactic nuclei contain super-massive black holes (SMBHs), nuclear stellar clusters (NSCs), or both. In the NSC, intermediate-mass black holes (IMBHs) are likely to reside and form highly eccentric binaries. Over time, the orbit of a binary could harden via interaction with surrounding low-mass stars. READ MORE
-
5. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE